@dragonmastery/dragoncore-vue 0.0.21 → 0.0.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (245) hide show
  1. package/dist/{AppLink-CHMMrSFI.js → AppLink-FcNGKgvG.js} +1 -1
  2. package/dist/{AppLink-CHMMrSFI.js.map → AppLink-FcNGKgvG.js.map} +1 -1
  3. package/dist/Appearance-Ch4zfWZ3.js +3 -0
  4. package/dist/{Appearance-DxWTyx1M.js → Appearance-shr0Aql0.js} +1 -1
  5. package/dist/{Appearance-DxWTyx1M.js.map → Appearance-shr0Aql0.js.map} +1 -1
  6. package/dist/{ChangePasswordPage--3XwluwE.js → ChangePasswordPage-C633yQiU.js} +2 -2
  7. package/dist/{ChangePasswordPage--3XwluwE.js.map → ChangePasswordPage-C633yQiU.js.map} +1 -1
  8. package/dist/ChangePasswordPage-CYuCCosx.js +7 -0
  9. package/dist/ConfirmDialog-DjthOYU6.js +85 -0
  10. package/dist/ConfirmDialog-DjthOYU6.js.map +1 -0
  11. package/dist/ConsentRequired-BPjsZoPY.js +211 -0
  12. package/dist/ConsentRequired-BPjsZoPY.js.map +1 -0
  13. package/dist/CreateTeamForm-CeaC41VY.js +142 -0
  14. package/dist/CreateTeamForm-CeaC41VY.js.map +1 -0
  15. package/dist/CreateTeamForm-DfgCaUwX.js +12 -0
  16. package/dist/CreateTeamMemberForm-Bv9gNG4z.js +140 -0
  17. package/dist/CreateTeamMemberForm-Bv9gNG4z.js.map +1 -0
  18. package/dist/CreateTeamMemberForm-CnHfpob_.js +12 -0
  19. package/dist/CreateUserPage-C9uOeYDJ.js +7 -0
  20. package/dist/{CreateUserPage-DLwXeLAq.js → CreateUserPage-CqKcY7_X.js} +2 -2
  21. package/dist/{CreateUserPage-DLwXeLAq.js.map → CreateUserPage-CqKcY7_X.js.map} +1 -1
  22. package/dist/CreditBalanceDashboard-0HiJE_OS.js +13 -0
  23. package/dist/CreditBalanceDashboard-k_orNn4h.js +28 -0
  24. package/dist/CreditBalanceDashboard-k_orNn4h.js.map +1 -0
  25. package/dist/CreditManagement-BVBZQDI4.js +356 -0
  26. package/dist/CreditManagement-BVBZQDI4.js.map +1 -0
  27. package/dist/CreditManagement-DXdIN-0d.js +13 -0
  28. package/dist/CreditTransactionHistory-DSu-6aDi.js +229 -0
  29. package/dist/CreditTransactionHistory-DSu-6aDi.js.map +1 -0
  30. package/dist/CustomerCreateSupportTicketForm-BsjX8Pja.js +14 -0
  31. package/dist/CustomerCreateSupportTicketForm-kf8YIGjx.js +158 -0
  32. package/dist/CustomerCreateSupportTicketForm-kf8YIGjx.js.map +1 -0
  33. package/dist/{CustomerSupportTicketDetailPage-BdyaKG1v.js → CustomerSupportTicketDetailPage-C_-YoAaP.js} +12 -9
  34. package/dist/{CustomerSupportTicketDetailPage-BdyaKG1v.js.map → CustomerSupportTicketDetailPage-C_-YoAaP.js.map} +1 -1
  35. package/dist/CustomerSupportTicketList-DdACn3ug.js +63 -0
  36. package/dist/{CustomerSupportTicketParent-HIxwSVdu.js → CustomerSupportTicketParent-BpBuYCrP.js} +4 -4
  37. package/dist/{CustomerSupportTicketParent-HIxwSVdu.js.map → CustomerSupportTicketParent-BpBuYCrP.js.map} +1 -1
  38. package/dist/CustomerSupportTicketParent-Djy7pNqO.js +8 -0
  39. package/dist/CustomerSupportTicketSuccess-DsFzpJFU.js +12 -0
  40. package/dist/CustomerSupportTicketSuccess-cumNSGdx.js +54 -0
  41. package/dist/CustomerSupportTicketSuccess-cumNSGdx.js.map +1 -0
  42. package/dist/EditTeamForm-BE3iX2x3.js +12 -0
  43. package/dist/EditTeamForm-BxRN338L.js +163 -0
  44. package/dist/EditTeamForm-BxRN338L.js.map +1 -0
  45. package/dist/EditTeamMemberForm-D7D1Zddh.js +9 -0
  46. package/dist/{EditTeamMemberForm-CaS2GLjV.js → EditTeamMemberForm-DfgJr5Cy.js} +7 -72
  47. package/dist/EditTeamMemberForm-DfgJr5Cy.js.map +1 -0
  48. package/dist/EditUserPage-C0K7EGjM.js +8 -0
  49. package/dist/{EditUserPage-DURc5rmi.js → EditUserPage-CI_jtU8P.js} +4 -4
  50. package/dist/{EditUserPage-DURc5rmi.js.map → EditUserPage-CI_jtU8P.js.map} +1 -1
  51. package/dist/EnhancedRefreshTokenHandler-C6tZCcfX.js +189 -0
  52. package/dist/EnhancedRefreshTokenHandler-C6tZCcfX.js.map +1 -0
  53. package/dist/FieldsetSection-Cd4B8Ad7.js +27 -0
  54. package/dist/FieldsetSection-Cd4B8Ad7.js.map +1 -0
  55. package/dist/{ForgotPassword-OjIPi9s9.js → ForgotPassword-Ckb9Z-wb.js} +4 -4
  56. package/dist/{ForgotPassword-OjIPi9s9.js.map → ForgotPassword-Ckb9Z-wb.js.map} +1 -1
  57. package/dist/ForgotPassword-tJVSg7PB.js +8 -0
  58. package/dist/{TimelineSystemEvent-BHzFr46C.js → InlineAttachments-DAn_QknY.js} +60 -661
  59. package/dist/InlineAttachments-DAn_QknY.js.map +1 -0
  60. package/dist/{LoginForm-9UFnA-fO.js → LoginForm-CMN2T1fA.js} +5 -5
  61. package/dist/{LoginForm-9UFnA-fO.js.map → LoginForm-CMN2T1fA.js.map} +1 -1
  62. package/dist/LoginForm-QFJ8NHww.js +8 -0
  63. package/dist/{Logout-YgTgOFUH.js → Logout-CFLYHlLr.js} +5 -5
  64. package/dist/{Logout-YgTgOFUH.js.map → Logout-CFLYHlLr.js.map} +1 -1
  65. package/dist/Logout-CjDBff3W.js +8 -0
  66. package/dist/MfaSetup-BZcoxJx-.js +9 -0
  67. package/dist/{MfaSetup-RtFMY_dj.js → MfaSetup-XqoAwBXx.js} +5 -5
  68. package/dist/{MfaSetup-RtFMY_dj.js.map → MfaSetup-XqoAwBXx.js.map} +1 -1
  69. package/dist/{MfaVerify-Cvhe8bEM.js → MfaVerify-C-A75TFZ.js} +6 -6
  70. package/dist/{MfaVerify-Cvhe8bEM.js.map → MfaVerify-C-A75TFZ.js.map} +1 -1
  71. package/dist/MfaVerify-Dy2aV5Gk.js +9 -0
  72. package/dist/{RecordVersionViewer-BWZ78vvE.js → RecordVersionViewer-D2j10HdK.js} +1 -1
  73. package/dist/{RecordVersionViewer-BWZ78vvE.js.map → RecordVersionViewer-D2j10HdK.js.map} +1 -1
  74. package/dist/{ResetPassword-BE4mXK9q.js → ResetPassword-Cd-Yxp8E.js} +4 -4
  75. package/dist/{ResetPassword-BE4mXK9q.js.map → ResetPassword-Cd-Yxp8E.js.map} +1 -1
  76. package/dist/ResetPassword-D6to3G6a.js +8 -0
  77. package/dist/{SavedFiltersPage-DQt6uc8m.js → SavedFiltersPage-DM5DvAFa.js} +62 -34
  78. package/dist/{SavedFiltersPage-DQt6uc8m.js.map → SavedFiltersPage-DM5DvAFa.js.map} +1 -1
  79. package/dist/{Signup-9TjMMnU4.js → Signup-2pqvJiVt.js} +57 -57
  80. package/dist/Signup-2pqvJiVt.js.map +1 -0
  81. package/dist/Signup-XdImA1os.js +9 -0
  82. package/dist/{SignupConsentFlow-QUZGKjdB.js → SignupConsentFlow-X3kXuviv.js} +106 -70
  83. package/dist/SignupConsentFlow-X3kXuviv.js.map +1 -0
  84. package/dist/{SignupRequirementsPage-DfbYmpQD.js → SignupRequirementsPage-Cf-ElkEq.js} +9 -8
  85. package/dist/{SignupRequirementsPage-DfbYmpQD.js.map → SignupRequirementsPage-Cf-ElkEq.js.map} +1 -1
  86. package/dist/StaffCreateSupportTicketForm-BlUP2XXy.js +14 -0
  87. package/dist/StaffCreateSupportTicketForm-D2nn4rTU.js +255 -0
  88. package/dist/StaffCreateSupportTicketForm-D2nn4rTU.js.map +1 -0
  89. package/dist/{StaffSupportTicketDetailPage-DQdfh6H1.js → StaffSupportTicketDetailPage-MFtm06BE.js} +14 -11
  90. package/dist/{StaffSupportTicketDetailPage-DQdfh6H1.js.map → StaffSupportTicketDetailPage-MFtm06BE.js.map} +1 -1
  91. package/dist/StaffSupportTicketList-LfLx0pYP.js +63 -0
  92. package/dist/StaffSupportTicketParent-B7mEN1oD.js +8 -0
  93. package/dist/{StaffSupportTicketParent-CilR4RGM.js → StaffSupportTicketParent-BvPwgOqH.js} +4 -4
  94. package/dist/{StaffSupportTicketParent-CilR4RGM.js.map → StaffSupportTicketParent-BvPwgOqH.js.map} +1 -1
  95. package/dist/StaffSupportTicketSuccess-BMCOP3ko.js +12 -0
  96. package/dist/StaffSupportTicketSuccess-Ca2WrcRg.js +54 -0
  97. package/dist/StaffSupportTicketSuccess-Ca2WrcRg.js.map +1 -0
  98. package/dist/{SupportStaffPage-KKugAnFm.js → SupportStaffPage-B69-kuvg.js} +8 -7
  99. package/dist/{SupportStaffPage-KKugAnFm.js.map → SupportStaffPage-B69-kuvg.js.map} +1 -1
  100. package/dist/{SupportTicketDevLifecycleBadge-EMrQHfyG.js → SupportTicketDevLifecycleBadge-BoAjMb08.js} +1 -1
  101. package/dist/{SupportTicketDevLifecycleBadge-EMrQHfyG.js.map → SupportTicketDevLifecycleBadge-BoAjMb08.js.map} +1 -1
  102. package/dist/{SupportTicketMaintenancePage-smItdkrD.js → SupportTicketMaintenancePage-Bptja-xb.js} +5 -4
  103. package/dist/{SupportTicketMaintenancePage-smItdkrD.js.map → SupportTicketMaintenancePage-Bptja-xb.js.map} +1 -1
  104. package/dist/TeamAttachmentsTab-Dk3LxX3n.js +63 -0
  105. package/dist/TeamHistoryTab-CRONdHcL.js +6 -0
  106. package/dist/{TeamHistoryTab-D5biUPmq.js → TeamHistoryTab-DM8KBEG1.js} +7 -19
  107. package/dist/TeamHistoryTab-DM8KBEG1.js.map +1 -0
  108. package/dist/TeamList-DYm_vQ2z.js +8 -0
  109. package/dist/TeamList-qdwlMuJv.js +141 -0
  110. package/dist/TeamList-qdwlMuJv.js.map +1 -0
  111. package/dist/TeamMemberList-4LRLT_7Z.js +7 -0
  112. package/dist/TeamMemberList-DyI1U1t_.js +166 -0
  113. package/dist/TeamMemberList-DyI1U1t_.js.map +1 -0
  114. package/dist/TeamMemberParent-B63pRfI6.js +10 -0
  115. package/dist/TeamMemberParent-D9Fxu7GD.js +83 -0
  116. package/dist/TeamMemberParent-D9Fxu7GD.js.map +1 -0
  117. package/dist/TeamMembersTab-BGcdyEE8.js +3 -0
  118. package/dist/{TeamMembersTab-4gmnP9sD.js → TeamMembersTab-BigqpBDH.js} +1 -1
  119. package/dist/{TeamMembersTab-4gmnP9sD.js.map → TeamMembersTab-BigqpBDH.js.map} +1 -1
  120. package/dist/{TeamNotesTab-BzGZZ1h8.js → TeamNotesTab-BgxleidZ.js} +6 -5
  121. package/dist/{TeamNotesTab-BzGZZ1h8.js.map → TeamNotesTab-BgxleidZ.js.map} +1 -1
  122. package/dist/TeamNotesTab-o7glfjoY.js +8 -0
  123. package/dist/TeamParent-BwXqA3rj.js +83 -0
  124. package/dist/TeamParent-BwXqA3rj.js.map +1 -0
  125. package/dist/TeamParent-CFOmyKPz.js +11 -0
  126. package/dist/{TimelineNoteInput-0p-M4Qie.js → TimelineNoteInput-DXaodm43.js} +3 -2
  127. package/dist/{TimelineNoteInput-0p-M4Qie.js.map → TimelineNoteInput-DXaodm43.js.map} +1 -1
  128. package/dist/TimelineSystemEvent-zCMUx5Zz.js +525 -0
  129. package/dist/TimelineSystemEvent-zCMUx5Zz.js.map +1 -0
  130. package/dist/UserListPage-Bmwg0an5.js +5 -0
  131. package/dist/{UserListPage-DUE5gJTo.js → UserListPage-DtA8tLff.js} +4 -3
  132. package/dist/{UserListPage-DUE5gJTo.js.map → UserListPage-DtA8tLff.js.map} +1 -1
  133. package/dist/UserProfilePage-DRbCAr9H.js +8 -0
  134. package/dist/{UserProfilePage-C3b93Keh.js → UserProfilePage-g4-VEDXo.js} +4 -4
  135. package/dist/{UserProfilePage-C3b93Keh.js.map → UserProfilePage-g4-VEDXo.js.map} +1 -1
  136. package/dist/{VerifyEmail-DlOmWGG-.js → VerifyEmail-CM5ehFB8.js} +7 -7
  137. package/dist/{VerifyEmail-DlOmWGG-.js.map → VerifyEmail-CM5ehFB8.js.map} +1 -1
  138. package/dist/VerifyEmail-DMHczC9f.js +10 -0
  139. package/dist/ViewTeam-CXyABxE6.js +8 -0
  140. package/dist/ViewTeam-DSbKV60o.js +220 -0
  141. package/dist/ViewTeam-DSbKV60o.js.map +1 -0
  142. package/dist/ViewTeamMember-BB0nvPOe.js +167 -0
  143. package/dist/ViewTeamMember-BB0nvPOe.js.map +1 -0
  144. package/dist/ViewTeamMember-jrOnBaDh.js +7 -0
  145. package/dist/ZiniaContainer-CjVhCnGB.js +18 -0
  146. package/dist/ZiniaContainer-CjVhCnGB.js.map +1 -0
  147. package/dist/{convertToLocalDateTime-CFhtN6PI.js → convertToLocalDateTime-BF25N4xd.js} +1 -2
  148. package/dist/convertToLocalDateTime-BF25N4xd.js.map +1 -0
  149. package/dist/customerSupportTicketRoutes-C7OxGAGl.js +142 -0
  150. package/dist/customerSupportTicketRoutes-C7OxGAGl.js.map +1 -0
  151. package/dist/{displayIdFormatter-Dz900Awr.js → displayIdFormatter-B-_WQHOr.js} +1 -1
  152. package/dist/{displayIdFormatter-Dz900Awr.js.map → displayIdFormatter-B-_WQHOr.js.map} +1 -1
  153. package/dist/{extractRpcErrorMessage-Di8E8-Wh.js → extractRpcErrorMessage-diUBl6Ij.js} +1 -1
  154. package/dist/{extractRpcErrorMessage-Di8E8-Wh.js.map → extractRpcErrorMessage-diUBl6Ij.js.map} +1 -1
  155. package/dist/index.d.ts +793 -834
  156. package/dist/index.js +66 -38
  157. package/dist/{mfaSchema-BnRWf0ma.js → mfaSchema-Ukqzdyck.js} +1 -1
  158. package/dist/{mfaSchema-BnRWf0ma.js.map → mfaSchema-Ukqzdyck.js.map} +1 -1
  159. package/dist/saved_filter-CfzH0BzK.js +1210 -0
  160. package/dist/saved_filter-CfzH0BzK.js.map +1 -0
  161. package/dist/signupConsentStorage-DS9vCUuC.js +27 -0
  162. package/dist/signupConsentStorage-DS9vCUuC.js.map +1 -0
  163. package/dist/{src-CEBiyg_f.css → src-C6ZmNSSU.css} +1 -1
  164. package/dist/{src-CEBiyg_f.css.map → src-C6ZmNSSU.css.map} +1 -1
  165. package/dist/src-DVe_0RO9.js +4654 -0
  166. package/dist/src-DVe_0RO9.js.map +1 -0
  167. package/dist/staffSupportTicketRoutes-CWutoQWp.js +135 -0
  168. package/dist/staffSupportTicketRoutes-CWutoQWp.js.map +1 -0
  169. package/dist/teamMemberMetadata-CQnbVepq.js +49 -0
  170. package/dist/teamMemberMetadata-CQnbVepq.js.map +1 -0
  171. package/dist/teamMetadata-DlvwO5V0.js +53 -0
  172. package/dist/teamMetadata-DlvwO5V0.js.map +1 -0
  173. package/dist/teamRoutes-KFgnsdDP.js +192 -0
  174. package/dist/teamRoutes-KFgnsdDP.js.map +1 -0
  175. package/dist/team_memberRoutes-Cjpw_ql6.js +84 -0
  176. package/dist/team_memberRoutes-Cjpw_ql6.js.map +1 -0
  177. package/dist/{useBreadcrumbs-qB6ghsAf.js → useBreadcrumbs-DIqU5AAp.js} +1 -1
  178. package/dist/{useBreadcrumbs-qB6ghsAf.js.map → useBreadcrumbs-DIqU5AAp.js.map} +1 -1
  179. package/dist/{useEmailVerificationChannel-BNi926Ho.js → useEmailVerificationChannel-B51z65PN.js} +3 -3
  180. package/dist/{useEmailVerificationChannel-BNi926Ho.js.map → useEmailVerificationChannel-B51z65PN.js.map} +1 -1
  181. package/dist/{useMutation-BTsyHKyn.js → useMutation-BLNuJoYl.js} +6 -3
  182. package/dist/useMutation-BLNuJoYl.js.map +1 -0
  183. package/dist/{useQuery-BggIE52P.js → useQuery-BzUGEOj0.js} +4 -3
  184. package/dist/{useQuery-BggIE52P.js.map → useQuery-BzUGEOj0.js.map} +1 -1
  185. package/dist/{useQueryCache-Bjm-S8v5.js → useQueryCache-alzaRWEb.js} +2 -2
  186. package/dist/{useQueryCache-Bjm-S8v5.js.map → useQueryCache-alzaRWEb.js.map} +1 -1
  187. package/dist/{useReturnUrl-qFeazn-G.js → useReturnUrl-B5V3SJf5.js} +1 -1
  188. package/dist/{useReturnUrl-qFeazn-G.js.map → useReturnUrl-B5V3SJf5.js.map} +1 -1
  189. package/dist/{useRpcAuth-rmHf7bYx.js → useRpcAuth-CJtq1dqM.js} +25 -194
  190. package/dist/useRpcAuth-CJtq1dqM.js.map +1 -0
  191. package/dist/userAuthorized-C09FHWGL.js +185 -0
  192. package/dist/userAuthorized-C09FHWGL.js.map +1 -0
  193. package/package.json +3 -3
  194. package/dist/Appearance-D5pwxuf4.js +0 -3
  195. package/dist/ChangePasswordPage-CpDPmEml.js +0 -6
  196. package/dist/ConsentRequired-C4IRMA0c.js +0 -213
  197. package/dist/ConsentRequired-C4IRMA0c.js.map +0 -1
  198. package/dist/CreateTeamForm-B4cIuYAf.js +0 -35
  199. package/dist/CreateTeamMemberForm-Chrw1y00.js +0 -35
  200. package/dist/CreateUserPage-WruMs7WP.js +0 -6
  201. package/dist/CreditBalanceDashboard-CkcsrZ_e.js +0 -35
  202. package/dist/CreditManagement-Ddvu9dMw.js +0 -35
  203. package/dist/CustomerCreateSupportTicketForm-BKperKGS.js +0 -35
  204. package/dist/CustomerSupportTicketList-DcbrjDa9.js +0 -35
  205. package/dist/CustomerSupportTicketParent-BeNzUwuP.js +0 -7
  206. package/dist/CustomerSupportTicketSuccess-CC967u3y.js +0 -35
  207. package/dist/EditTeamForm-B5Tee5wL.js +0 -35
  208. package/dist/EditTeamMemberForm-CaS2GLjV.js.map +0 -1
  209. package/dist/EditTeamMemberForm-OtcS8QWt.js +0 -6
  210. package/dist/EditUserPage-T4DQlKhf.js +0 -7
  211. package/dist/ForgotPassword-CUifhmqP.js +0 -7
  212. package/dist/LoginForm-Bg7GoZEA.js +0 -7
  213. package/dist/Logout-Bs92csWH.js +0 -7
  214. package/dist/MfaSetup-BACX5XP-.js +0 -8
  215. package/dist/MfaVerify-ak4iSdQ2.js +0 -8
  216. package/dist/ResetPassword-pY1uhTdl.js +0 -7
  217. package/dist/Signup-9TjMMnU4.js.map +0 -1
  218. package/dist/Signup-Bq-G3D-s.js +0 -9
  219. package/dist/SignupConsentFlow-QUZGKjdB.js.map +0 -1
  220. package/dist/StaffCreateSupportTicketForm-D0ZuisDk.js +0 -35
  221. package/dist/StaffSupportTicketList-CiqC05XB.js +0 -35
  222. package/dist/StaffSupportTicketParent-DkV329NI.js +0 -7
  223. package/dist/StaffSupportTicketSuccess-CUYnimaI.js +0 -35
  224. package/dist/TeamAttachmentsTab-DUtCD1Yi.js +0 -35
  225. package/dist/TeamHistoryTab-BsUoH4VK.js +0 -4
  226. package/dist/TeamHistoryTab-D5biUPmq.js.map +0 -1
  227. package/dist/TeamList-BkPIqZ8V.js +0 -35
  228. package/dist/TeamMemberList-1mxUGCNa.js +0 -35
  229. package/dist/TeamMemberParent-DzeBIElY.js +0 -35
  230. package/dist/TeamMembersTab-CBB2Yl_I.js +0 -3
  231. package/dist/TeamNotesTab-ClHl2nXd.js +0 -7
  232. package/dist/TeamParent-DJa9UZTP.js +0 -35
  233. package/dist/TimelineSystemEvent-BHzFr46C.js.map +0 -1
  234. package/dist/UserListPage-BTLE4J0s.js +0 -4
  235. package/dist/UserProfilePage-CVTORtSx.js +0 -7
  236. package/dist/VerifyEmail-DCP4DWIw.js +0 -9
  237. package/dist/ViewTeam-DVfnLMhV.js +0 -35
  238. package/dist/ViewTeamMember-L4v3gCIn.js +0 -35
  239. package/dist/convertToLocalDateTime-CFhtN6PI.js.map +0 -1
  240. package/dist/src-QZJyMfGX.js +0 -8951
  241. package/dist/src-QZJyMfGX.js.map +0 -1
  242. package/dist/useMutation-BTsyHKyn.js.map +0 -1
  243. package/dist/useRpcAuth-rmHf7bYx.js.map +0 -1
  244. package/dist/useSignupPendingData-BWHwUHhL.js +0 -47
  245. package/dist/useSignupPendingData-BWHwUHhL.js.map +0 -1
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useMutation-BLNuJoYl.js","names":[],"sources":["../src/composables/useMutation.ts"],"sourcesContent":["import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { shallowRef, type ShallowRef } from 'vue';\nimport { getRefreshTokenHandler } from '../utils/EnhancedRefreshTokenHandler';\nimport type { MutationFunction, UseMutationOptions } from './types';\nimport { queryCache } from './useQueryCache';\nimport { executeWithAuth } from './useRpcAuth';\n\nexport interface UseMutationReturn<TInput, TOutput> {\n data: ShallowRef<TOutput | null>;\n loading: ShallowRef<boolean>;\n error: ShallowRef<Error | null>;\n mutate: (input: TInput) => Promise<TOutput>;\n reset: () => void;\n}\n\nexport function useMutation<\n TApi extends Record<string, any> = DragoncoreApi,\n TInput = any,\n TOutput = any,\n>(\n mutationFn: MutationFunction<TApi, TInput, TOutput>,\n options?: UseMutationOptions<TInput, TOutput>,\n): UseMutationReturn<TInput, TOutput> {\n // Get the global refresh token handler - Dragoncore handles this automatically\n const refreshTokenHandler = getRefreshTokenHandler();\n const loading = shallowRef(false);\n const error = shallowRef<Error | null>(null);\n const data = shallowRef<TOutput | null>(null);\n\n const mutate = async (input: TInput): Promise<TOutput> => {\n loading.value = true;\n error.value = null;\n\n try {\n // Skip auth check for public endpoints (signup) or login/logout operations\n const skipAuthCheck = options?.skipAuthCheck || options?.credentials === 'include';\n const authTokenOverride = options?.customAuthToken?.(input);\n const result = await executeWithAuth<TApi, TOutput>(\n (batch) => mutationFn(batch, input),\n {\n credentials: options?.credentials,\n skipAuthCheck,\n authTokenOverride,\n refreshTokenHandler,\n },\n );\n data.value = result;\n\n // Invalidate related queries\n if (options?.invalidate) {\n if (Array.isArray(options.invalidate)) {\n options.invalidate.forEach((key) => queryCache.invalidate(key));\n } else {\n queryCache.invalidate(options.invalidate);\n }\n }\n\n // Call success callback\n if (options?.onSuccess) {\n options.onSuccess(result, input);\n }\n\n return result;\n } catch (e) {\n error.value = e instanceof Error ? e : new Error('Unknown error');\n\n // Call error callback\n if (options?.onError) {\n options.onError(error.value, input);\n }\n\n throw e;\n } finally {\n loading.value = false;\n }\n };\n\n const reset = () => {\n data.value = null;\n error.value = null;\n loading.value = false;\n };\n\n return { mutate, loading, error, data, reset };\n}\n"],"mappings":";;;;;;AAeA,SAAgB,YAKd,YACA,SACoC;CAEpC,MAAM,sBAAsB,wBAAwB;CACpD,MAAM,UAAU,WAAW,MAAM;CACjC,MAAM,QAAQ,WAAyB,KAAK;CAC5C,MAAM,OAAO,WAA2B,KAAK;CAE7C,MAAM,SAAS,OAAO,UAAoC;AACxD,UAAQ,QAAQ;AAChB,QAAM,QAAQ;AAEd,MAAI;GAEF,MAAM,gBAAgB,SAAS,iBAAiB,SAAS,gBAAgB;GACzE,MAAM,oBAAoB,SAAS,kBAAkB,MAAM;GAC3D,MAAM,SAAS,MAAM,iBAClB,UAAU,WAAW,OAAO,MAAM,EACnC;IACE,aAAa,SAAS;IACtB;IACA;IACA;IACD,CACF;AACD,QAAK,QAAQ;AAGb,OAAI,SAAS,WACX,KAAI,MAAM,QAAQ,QAAQ,WAAW,CACnC,SAAQ,WAAW,SAAS,QAAQ,WAAW,WAAW,IAAI,CAAC;OAE/D,YAAW,WAAW,QAAQ,WAAW;AAK7C,OAAI,SAAS,UACX,SAAQ,UAAU,QAAQ,MAAM;AAGlC,UAAO;WACA,GAAG;AACV,SAAM,QAAQ,aAAa,QAAQ,oBAAI,IAAI,MAAM,gBAAgB;AAGjE,OAAI,SAAS,QACX,SAAQ,QAAQ,MAAM,OAAO,MAAM;AAGrC,SAAM;YACE;AACR,WAAQ,QAAQ;;;CAIpB,MAAM,cAAc;AAClB,OAAK,QAAQ;AACb,QAAM,QAAQ;AACd,UAAQ,QAAQ;;AAGlB,QAAO;EAAE;EAAQ;EAAS;EAAO;EAAM;EAAO"}
@@ -1,5 +1,6 @@
1
- import { f as logIfEnabled, r as executeWithAuth, s as getRefreshTokenHandler } from "./useRpcAuth-rmHf7bYx.js";
2
- import { t as queryCache } from "./useQueryCache-Bjm-S8v5.js";
1
+ import { l as logIfEnabled, r as executeWithAuth } from "./useRpcAuth-CJtq1dqM.js";
2
+ import { r as getRefreshTokenHandler } from "./EnhancedRefreshTokenHandler-C6tZCcfX.js";
3
+ import { t as queryCache } from "./useQueryCache-alzaRWEb.js";
3
4
  import { onMounted, onUnmounted, shallowRef, watch } from "vue";
4
5
 
5
6
  //#region src/composables/useQuery.ts
@@ -104,4 +105,4 @@ function useQuery(queryFn, options) {
104
105
 
105
106
  //#endregion
106
107
  export { useQuery as t };
107
- //# sourceMappingURL=useQuery-BggIE52P.js.map
108
+ //# sourceMappingURL=useQuery-BzUGEOj0.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"useQuery-BggIE52P.js","names":[],"sources":["../src/composables/useQuery.ts"],"sourcesContent":["import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { onMounted, onUnmounted, shallowRef, type ShallowRef, watch } from 'vue';\nimport { getRefreshTokenHandler } from '../utils/EnhancedRefreshTokenHandler';\nimport { logIfEnabled } from '../utils/logger';\nimport type { QueryFunction, UseQueryOptions } from './types';\nimport { queryCache } from './useQueryCache';\nimport { executeWithAuth } from './useRpcAuth';\n\nexport interface UseQueryReturn<T> {\n data: ShallowRef<T | null>;\n loading: ShallowRef<boolean>;\n error: ShallowRef<Error | null>;\n dataUpdatedAt: ShallowRef<number>;\n execute: () => Promise<void>;\n refetch: () => Promise<void>;\n}\n\nexport function useQuery<TApi extends Record<string, any> = DragoncoreApi, T = any>(\n queryFn: QueryFunction<TApi, T>,\n options?: UseQueryOptions,\n): UseQueryReturn<T> {\n // Get the global refresh token handler - Dragoncore handles this automatically\n const refreshTokenHandler = getRefreshTokenHandler();\n\n const data = shallowRef<T | null>(null);\n const loading = shallowRef(options?.immediate !== false);\n const error = shallowRef<Error | null>(null);\n const dataUpdatedAt = shallowRef<number>(0);\n // Internal flag to prevent duplicate background fetches (not exposed to consumers)\n let isBackgroundFetching = false;\n // Default debug to false if not specified\n const debug = options?.debug ?? false;\n // Default persist to true when cacheKey is provided (localStorage persistence is default)\n // Set persist: false to disable localStorage persistence (in-memory caching still works)\n const persist = options?.persist ?? (options?.cacheKey ? true : false);\n\n const execute = async (skipCache = false) => {\n const isEnabled =\n typeof options?.enabled === 'boolean'\n ? options?.enabled\n : (options?.enabled?.value ?? true);\n\n if (!isEnabled) {\n loading.value = false;\n return;\n }\n\n loading.value = true;\n error.value = null;\n\n // Check cache first (unless explicitly skipping)\n if (options?.cacheKey && !skipCache) {\n const cached = queryCache.get<T>(options.cacheKey, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: debug,\n });\n\n if (cached !== null) {\n logIfEnabled('debug', `[Query] Cache HIT: ${options.cacheKey}`, debug);\n data.value = cached;\n loading.value = false;\n\n // Optionally fetch fresh data in background if refetchOnWindowFocus\n if (options?.refetchOnWindowFocus) {\n executeInBackground();\n }\n return;\n }\n logIfEnabled('debug', `[Query] Cache MISS: ${options.cacheKey}`, debug);\n }\n\n try {\n const result = await executeWithAuth<TApi, T>((batch) => queryFn(batch), {\n credentials: options?.credentials,\n skipAuthCheck: options?.skipAuthCheck ?? false,\n mode: options?.batchMode,\n trackedSegment: options?.trackedSegment, // Pass through the tracked segment\n refreshTokenHandler,\n });\n data.value = result;\n dataUpdatedAt.value = Date.now();\n\n // Cache the result\n if (options?.cacheKey) {\n queryCache.set(options.cacheKey, result, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: options?.debug,\n });\n }\n } catch (e) {\n error.value = e instanceof Error ? e : new Error('Unknown error');\n data.value = null;\n } finally {\n loading.value = false;\n }\n };\n\n const executeInBackground = async () => {\n if (isBackgroundFetching || loading.value) return; // Don't fetch if already fetching\n\n isBackgroundFetching = true;\n try {\n const result = await executeWithAuth<TApi, T>((batch) => queryFn(batch), {\n credentials: options?.credentials,\n skipAuthCheck: options?.skipAuthCheck ?? false,\n mode: options?.batchMode ? 'batch' : 'tracked',\n trackedSegment: options?.trackedSegment, // Pass through the tracked segment\n refreshTokenHandler,\n });\n data.value = result;\n dataUpdatedAt.value = Date.now();\n\n if (options?.cacheKey) {\n queryCache.set(options.cacheKey, result, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: debug,\n });\n }\n } catch (e) {\n // Silent failure for background refetch\n logIfEnabled('error', '[Query] Background refetch failed:', debug, e);\n } finally {\n isBackgroundFetching = false;\n }\n };\n\n // Auto-execute on mount\n if (options?.immediate !== false) {\n onMounted(execute);\n }\n\n // Refetch on window focus\n if (options?.refetchOnWindowFocus) {\n const handleFocus = () => {\n if (data.value !== null) {\n executeInBackground();\n }\n };\n onMounted(() => window.addEventListener('focus', handleFocus));\n onUnmounted(() => window.removeEventListener('focus', handleFocus));\n }\n\n // Watch for changes\n if (options?.watch) {\n const watchTargets = Array.isArray(options.watch) ? options.watch : [options.watch];\n watch(watchTargets, () => execute());\n }\n\n // Watch enabled state\n if (options?.enabled && typeof options?.enabled !== 'boolean') {\n watch(options?.enabled, (isEnabled) => {\n if (isEnabled) execute();\n });\n }\n\n return {\n data,\n loading,\n error,\n dataUpdatedAt,\n execute: () => execute(),\n refetch: () => execute(true), // Skip cache on manual refetch\n };\n}\n"],"mappings":";;;;;AAiBA,SAAgB,SACd,SACA,SACmB;CAEnB,MAAM,sBAAsB,wBAAwB;CAEpD,MAAM,OAAO,WAAqB,KAAK;CACvC,MAAM,UAAU,WAAW,SAAS,cAAc,MAAM;CACxD,MAAM,QAAQ,WAAyB,KAAK;CAC5C,MAAM,gBAAgB,WAAmB,EAAE;CAE3C,IAAI,uBAAuB;CAE3B,MAAM,QAAQ,SAAS,SAAS;CAGhC,MAAM,UAAU,SAAS,YAAY,SAAS,WAAW,OAAO;CAEhE,MAAM,UAAU,OAAO,YAAY,UAAU;AAM3C,MAAI,EAJF,OAAO,SAAS,YAAY,YACxB,SAAS,UACR,SAAS,SAAS,SAAS,OAElB;AACd,WAAQ,QAAQ;AAChB;;AAGF,UAAQ,QAAQ;AAChB,QAAM,QAAQ;AAGd,MAAI,SAAS,YAAY,CAAC,WAAW;GACnC,MAAM,SAAS,WAAW,IAAO,QAAQ,UAAU;IACjD,WAAW,SAAS;IACX;IACF;IACR,CAAC;AAEF,OAAI,WAAW,MAAM;AACnB,iBAAa,SAAS,sBAAsB,QAAQ,YAAY,MAAM;AACtE,SAAK,QAAQ;AACb,YAAQ,QAAQ;AAGhB,QAAI,SAAS,qBACX,sBAAqB;AAEvB;;AAEF,gBAAa,SAAS,uBAAuB,QAAQ,YAAY,MAAM;;AAGzE,MAAI;GACF,MAAM,SAAS,MAAM,iBAA0B,UAAU,QAAQ,MAAM,EAAE;IACvE,aAAa,SAAS;IACtB,eAAe,SAAS,iBAAiB;IACzC,MAAM,SAAS;IACf,gBAAgB,SAAS;IACzB;IACD,CAAC;AACF,QAAK,QAAQ;AACb,iBAAc,QAAQ,KAAK,KAAK;AAGhC,OAAI,SAAS,SACX,YAAW,IAAI,QAAQ,UAAU,QAAQ;IACvC,WAAW,SAAS;IACX;IACT,OAAO,SAAS;IACjB,CAAC;WAEG,GAAG;AACV,SAAM,QAAQ,aAAa,QAAQ,oBAAI,IAAI,MAAM,gBAAgB;AACjE,QAAK,QAAQ;YACL;AACR,WAAQ,QAAQ;;;CAIpB,MAAM,sBAAsB,YAAY;AACtC,MAAI,wBAAwB,QAAQ,MAAO;AAE3C,yBAAuB;AACvB,MAAI;GACF,MAAM,SAAS,MAAM,iBAA0B,UAAU,QAAQ,MAAM,EAAE;IACvE,aAAa,SAAS;IACtB,eAAe,SAAS,iBAAiB;IACzC,MAAM,SAAS,YAAY,UAAU;IACrC,gBAAgB,SAAS;IACzB;IACD,CAAC;AACF,QAAK,QAAQ;AACb,iBAAc,QAAQ,KAAK,KAAK;AAEhC,OAAI,SAAS,SACX,YAAW,IAAI,QAAQ,UAAU,QAAQ;IACvC,WAAW,SAAS;IACX;IACF;IACR,CAAC;WAEG,GAAG;AAEV,gBAAa,SAAS,sCAAsC,OAAO,EAAE;YAC7D;AACR,0BAAuB;;;AAK3B,KAAI,SAAS,cAAc,MACzB,WAAU,QAAQ;AAIpB,KAAI,SAAS,sBAAsB;EACjC,MAAM,oBAAoB;AACxB,OAAI,KAAK,UAAU,KACjB,sBAAqB;;AAGzB,kBAAgB,OAAO,iBAAiB,SAAS,YAAY,CAAC;AAC9D,oBAAkB,OAAO,oBAAoB,SAAS,YAAY,CAAC;;AAIrE,KAAI,SAAS,MAEX,OADqB,MAAM,QAAQ,QAAQ,MAAM,GAAG,QAAQ,QAAQ,CAAC,QAAQ,MAAM,QACzD,SAAS,CAAC;AAItC,KAAI,SAAS,WAAW,OAAO,SAAS,YAAY,UAClD,OAAM,SAAS,UAAU,cAAc;AACrC,MAAI,UAAW,UAAS;GACxB;AAGJ,QAAO;EACL;EACA;EACA;EACA;EACA,eAAe,SAAS;EACxB,eAAe,QAAQ,KAAK;EAC7B"}
1
+ {"version":3,"file":"useQuery-BzUGEOj0.js","names":[],"sources":["../src/composables/useQuery.ts"],"sourcesContent":["import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { onMounted, onUnmounted, shallowRef, type ShallowRef, watch } from 'vue';\nimport { getRefreshTokenHandler } from '../utils/EnhancedRefreshTokenHandler';\nimport { logIfEnabled } from '../utils/logger';\nimport type { QueryFunction, UseQueryOptions } from './types';\nimport { queryCache } from './useQueryCache';\nimport { executeWithAuth } from './useRpcAuth';\n\nexport interface UseQueryReturn<T> {\n data: ShallowRef<T | null>;\n loading: ShallowRef<boolean>;\n error: ShallowRef<Error | null>;\n dataUpdatedAt: ShallowRef<number>;\n execute: () => Promise<void>;\n refetch: () => Promise<void>;\n}\n\nexport function useQuery<TApi extends Record<string, any> = DragoncoreApi, T = any>(\n queryFn: QueryFunction<TApi, T>,\n options?: UseQueryOptions,\n): UseQueryReturn<T> {\n // Get the global refresh token handler - Dragoncore handles this automatically\n const refreshTokenHandler = getRefreshTokenHandler();\n\n const data = shallowRef<T | null>(null);\n const loading = shallowRef(options?.immediate !== false);\n const error = shallowRef<Error | null>(null);\n const dataUpdatedAt = shallowRef<number>(0);\n // Internal flag to prevent duplicate background fetches (not exposed to consumers)\n let isBackgroundFetching = false;\n // Default debug to false if not specified\n const debug = options?.debug ?? false;\n // Default persist to true when cacheKey is provided (localStorage persistence is default)\n // Set persist: false to disable localStorage persistence (in-memory caching still works)\n const persist = options?.persist ?? (options?.cacheKey ? true : false);\n\n const execute = async (skipCache = false) => {\n const isEnabled =\n typeof options?.enabled === 'boolean'\n ? options?.enabled\n : (options?.enabled?.value ?? true);\n\n if (!isEnabled) {\n loading.value = false;\n return;\n }\n\n loading.value = true;\n error.value = null;\n\n // Check cache first (unless explicitly skipping)\n if (options?.cacheKey && !skipCache) {\n const cached = queryCache.get<T>(options.cacheKey, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: debug,\n });\n\n if (cached !== null) {\n logIfEnabled('debug', `[Query] Cache HIT: ${options.cacheKey}`, debug);\n data.value = cached;\n loading.value = false;\n\n // Optionally fetch fresh data in background if refetchOnWindowFocus\n if (options?.refetchOnWindowFocus) {\n executeInBackground();\n }\n return;\n }\n logIfEnabled('debug', `[Query] Cache MISS: ${options.cacheKey}`, debug);\n }\n\n try {\n const result = await executeWithAuth<TApi, T>((batch) => queryFn(batch), {\n credentials: options?.credentials,\n skipAuthCheck: options?.skipAuthCheck ?? false,\n mode: options?.batchMode,\n trackedSegment: options?.trackedSegment, // Pass through the tracked segment\n refreshTokenHandler,\n });\n data.value = result;\n dataUpdatedAt.value = Date.now();\n\n // Cache the result\n if (options?.cacheKey) {\n queryCache.set(options.cacheKey, result, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: options?.debug,\n });\n }\n } catch (e) {\n error.value = e instanceof Error ? e : new Error('Unknown error');\n data.value = null;\n } finally {\n loading.value = false;\n }\n };\n\n const executeInBackground = async () => {\n if (isBackgroundFetching || loading.value) return; // Don't fetch if already fetching\n\n isBackgroundFetching = true;\n try {\n const result = await executeWithAuth<TApi, T>((batch) => queryFn(batch), {\n credentials: options?.credentials,\n skipAuthCheck: options?.skipAuthCheck ?? false,\n mode: options?.batchMode ? 'batch' : 'tracked',\n trackedSegment: options?.trackedSegment, // Pass through the tracked segment\n refreshTokenHandler,\n });\n data.value = result;\n dataUpdatedAt.value = Date.now();\n\n if (options?.cacheKey) {\n queryCache.set(options.cacheKey, result, {\n staleTime: options?.staleTime,\n persist: persist,\n debug: debug,\n });\n }\n } catch (e) {\n // Silent failure for background refetch\n logIfEnabled('error', '[Query] Background refetch failed:', debug, e);\n } finally {\n isBackgroundFetching = false;\n }\n };\n\n // Auto-execute on mount\n if (options?.immediate !== false) {\n onMounted(execute);\n }\n\n // Refetch on window focus\n if (options?.refetchOnWindowFocus) {\n const handleFocus = () => {\n if (data.value !== null) {\n executeInBackground();\n }\n };\n onMounted(() => window.addEventListener('focus', handleFocus));\n onUnmounted(() => window.removeEventListener('focus', handleFocus));\n }\n\n // Watch for changes\n if (options?.watch) {\n const watchTargets = Array.isArray(options.watch) ? options.watch : [options.watch];\n watch(watchTargets, () => execute());\n }\n\n // Watch enabled state\n if (options?.enabled && typeof options?.enabled !== 'boolean') {\n watch(options?.enabled, (isEnabled) => {\n if (isEnabled) execute();\n });\n }\n\n return {\n data,\n loading,\n error,\n dataUpdatedAt,\n execute: () => execute(),\n refetch: () => execute(true), // Skip cache on manual refetch\n };\n}\n"],"mappings":";;;;;;AAiBA,SAAgB,SACd,SACA,SACmB;CAEnB,MAAM,sBAAsB,wBAAwB;CAEpD,MAAM,OAAO,WAAqB,KAAK;CACvC,MAAM,UAAU,WAAW,SAAS,cAAc,MAAM;CACxD,MAAM,QAAQ,WAAyB,KAAK;CAC5C,MAAM,gBAAgB,WAAmB,EAAE;CAE3C,IAAI,uBAAuB;CAE3B,MAAM,QAAQ,SAAS,SAAS;CAGhC,MAAM,UAAU,SAAS,YAAY,SAAS,WAAW,OAAO;CAEhE,MAAM,UAAU,OAAO,YAAY,UAAU;AAM3C,MAAI,EAJF,OAAO,SAAS,YAAY,YACxB,SAAS,UACR,SAAS,SAAS,SAAS,OAElB;AACd,WAAQ,QAAQ;AAChB;;AAGF,UAAQ,QAAQ;AAChB,QAAM,QAAQ;AAGd,MAAI,SAAS,YAAY,CAAC,WAAW;GACnC,MAAM,SAAS,WAAW,IAAO,QAAQ,UAAU;IACjD,WAAW,SAAS;IACX;IACF;IACR,CAAC;AAEF,OAAI,WAAW,MAAM;AACnB,iBAAa,SAAS,sBAAsB,QAAQ,YAAY,MAAM;AACtE,SAAK,QAAQ;AACb,YAAQ,QAAQ;AAGhB,QAAI,SAAS,qBACX,sBAAqB;AAEvB;;AAEF,gBAAa,SAAS,uBAAuB,QAAQ,YAAY,MAAM;;AAGzE,MAAI;GACF,MAAM,SAAS,MAAM,iBAA0B,UAAU,QAAQ,MAAM,EAAE;IACvE,aAAa,SAAS;IACtB,eAAe,SAAS,iBAAiB;IACzC,MAAM,SAAS;IACf,gBAAgB,SAAS;IACzB;IACD,CAAC;AACF,QAAK,QAAQ;AACb,iBAAc,QAAQ,KAAK,KAAK;AAGhC,OAAI,SAAS,SACX,YAAW,IAAI,QAAQ,UAAU,QAAQ;IACvC,WAAW,SAAS;IACX;IACT,OAAO,SAAS;IACjB,CAAC;WAEG,GAAG;AACV,SAAM,QAAQ,aAAa,QAAQ,oBAAI,IAAI,MAAM,gBAAgB;AACjE,QAAK,QAAQ;YACL;AACR,WAAQ,QAAQ;;;CAIpB,MAAM,sBAAsB,YAAY;AACtC,MAAI,wBAAwB,QAAQ,MAAO;AAE3C,yBAAuB;AACvB,MAAI;GACF,MAAM,SAAS,MAAM,iBAA0B,UAAU,QAAQ,MAAM,EAAE;IACvE,aAAa,SAAS;IACtB,eAAe,SAAS,iBAAiB;IACzC,MAAM,SAAS,YAAY,UAAU;IACrC,gBAAgB,SAAS;IACzB;IACD,CAAC;AACF,QAAK,QAAQ;AACb,iBAAc,QAAQ,KAAK,KAAK;AAEhC,OAAI,SAAS,SACX,YAAW,IAAI,QAAQ,UAAU,QAAQ;IACvC,WAAW,SAAS;IACX;IACF;IACR,CAAC;WAEG,GAAG;AAEV,gBAAa,SAAS,sCAAsC,OAAO,EAAE;YAC7D;AACR,0BAAuB;;;AAK3B,KAAI,SAAS,cAAc,MACzB,WAAU,QAAQ;AAIpB,KAAI,SAAS,sBAAsB;EACjC,MAAM,oBAAoB;AACxB,OAAI,KAAK,UAAU,KACjB,sBAAqB;;AAGzB,kBAAgB,OAAO,iBAAiB,SAAS,YAAY,CAAC;AAC9D,oBAAkB,OAAO,oBAAoB,SAAS,YAAY,CAAC;;AAIrE,KAAI,SAAS,MAEX,OADqB,MAAM,QAAQ,QAAQ,MAAM,GAAG,QAAQ,QAAQ,CAAC,QAAQ,MAAM,QACzD,SAAS,CAAC;AAItC,KAAI,SAAS,WAAW,OAAO,SAAS,YAAY,UAClD,OAAM,SAAS,UAAU,cAAc;AACrC,MAAI,UAAW,UAAS;GACxB;AAGJ,QAAO;EACL;EACA;EACA;EACA;EACA,eAAe,SAAS;EACxB,eAAe,QAAQ,KAAK;EAC7B"}
@@ -1,4 +1,4 @@
1
- import { f as logIfEnabled, p as logger } from "./useRpcAuth-rmHf7bYx.js";
1
+ import { l as logIfEnabled, u as logger } from "./useRpcAuth-CJtq1dqM.js";
2
2
 
3
3
  //#region src/composables/useQueryCache.ts
4
4
  var QueryCache = class {
@@ -251,4 +251,4 @@ if (import.meta.env.DEV) {
251
251
 
252
252
  //#endregion
253
253
  export { queryCache as t };
254
- //# sourceMappingURL=useQueryCache-Bjm-S8v5.js.map
254
+ //# sourceMappingURL=useQueryCache-alzaRWEb.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"useQueryCache-Bjm-S8v5.js","names":["keysToRemove: string[]","entry: CacheEntry<T>","entries: Record<\n string,\n {\n data: any;\n ageMs: number;\n expiresInMs: number;\n isExpired: boolean;\n source: 'memory' | 'storage';\n }\n >","entries: [string, number][]"],"sources":["../src/composables/useQueryCache.ts"],"sourcesContent":["import { logger, logIfEnabled } from '../utils/logger';\n\ninterface CacheEntry<T> {\n data: T;\n timestamp: number;\n expiresAt: number;\n}\n\ninterface CacheOptions {\n staleTime?: number; // How long data is fresh (ms), default 5 minutes\n persist?: boolean; // Save to localStorage\n debug?: boolean; // Enable/disable debug logging for this cache operation (default: false)\n}\n\nclass QueryCache {\n private memoryCache = new Map<string, CacheEntry<any>>();\n private readonly BUILD_TAG = import.meta.env.VITE_BUILD_TAG || 'dev';\n private readonly STORAGE_PREFIX = `rpc-cache:${this.BUILD_TAG}:`;\n private readonly BUILD_TAG_KEY = 'rpc-cache-build-tag';\n private cleanupTimers = new Map<string, number>();\n\n constructor() {\n // Check if this is a new deployment and clear old cache\n this.handleDeploymentChange();\n\n // Clean up expired localStorage entries on init\n this.cleanExpiredStorage();\n }\n\n /**\n * Detect deployment changes and clear old cache\n */\n private handleDeploymentChange() {\n const lastBuildTag = localStorage.getItem(this.BUILD_TAG_KEY);\n\n // If build tag is missing, clear all cache (first load or manual clear)\n if (!lastBuildTag) {\n // Use global log level for deployment change detection\n logger.debug('[Cache] Build tag missing - clearing all cache');\n this.clearAllStorage();\n }\n // If deployment changed, clear old cache from previous build\n else if (lastBuildTag !== this.BUILD_TAG) {\n // Use global log level for deployment change detection\n logger.debug(`[Cache] New deployment detected: ${lastBuildTag} → ${this.BUILD_TAG}`);\n logger.debug('[Cache] Clearing old cache from previous deployment');\n\n // Clear all old cache entries (from previous build tag)\n this.clearAllOldDeploymentCache(lastBuildTag);\n }\n\n // Store current build tag\n localStorage.setItem(this.BUILD_TAG_KEY, this.BUILD_TAG);\n }\n\n /**\n * Clear cache from previous deployment\n */\n private clearAllOldDeploymentCache(oldBuildTag: string) {\n const oldPrefix = `rpc-cache:${oldBuildTag}:`;\n const keysToRemove: string[] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(oldPrefix)) {\n keysToRemove.push(key);\n }\n }\n\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n\n if (keysToRemove.length > 0) {\n // Use global log level for deployment change detection\n logger.debug(`[Cache] Removed ${keysToRemove.length} entries from previous deployment`);\n }\n }\n\n /**\n * Get data from cache (memory first, then localStorage if persist enabled)\n */\n get<T>(key: string, options: CacheOptions = {}): T | null {\n const now = Date.now();\n const debug = options.debug ?? false;\n\n // 1. Try memory cache first\n const memoryEntry = this.memoryCache.get(key);\n if (memoryEntry) {\n if (now < memoryEntry.expiresAt) {\n return memoryEntry.data as T;\n }\n // Expired in memory\n this.memoryCache.delete(key);\n }\n\n // 2. Try localStorage if persist is enabled\n if (options.persist) {\n const storageEntry = this.getFromStorage<T>(key, debug);\n if (storageEntry) {\n if (now < storageEntry.expiresAt) {\n // Rehydrate to memory cache\n this.memoryCache.set(key, storageEntry);\n return storageEntry.data;\n }\n // Expired in storage\n this.removeFromStorage(key);\n }\n }\n\n return null;\n }\n\n /**\n * Set data in cache (memory and optionally localStorage)\n */\n set<T>(key: string, data: T, options: CacheOptions = {}) {\n const staleTime = options.staleTime ?? 300000; // Default 5 minutes\n const debug = options.debug ?? false;\n const entry: CacheEntry<T> = {\n data,\n timestamp: Date.now(),\n expiresAt: Date.now() + staleTime,\n };\n\n // 1. Set in memory\n this.memoryCache.set(key, entry);\n\n // 2. Persist to localStorage if enabled\n if (options.persist) {\n this.setInStorage(key, entry, debug);\n }\n\n // 3. Schedule automatic cleanup\n this.scheduleCleanup(key, staleTime);\n }\n\n /**\n * Invalidate cache entries matching a pattern\n */\n invalidate(pattern: string | RegExp, debug: boolean = false) {\n const keysToRemove: string[] = [];\n\n // Find matching keys in memory\n for (const key of this.memoryCache.keys()) {\n if (this.matchesPattern(key, pattern)) {\n keysToRemove.push(key);\n }\n }\n\n // Remove from memory and storage\n keysToRemove.forEach((key) => {\n this.memoryCache.delete(key);\n this.removeFromStorage(key);\n this.cancelCleanup(key);\n });\n\n logIfEnabled(\n 'debug',\n `[Cache] Invalidated ${keysToRemove.length} entries matching:`,\n debug,\n pattern,\n );\n }\n\n /**\n * Clear all cache entries\n */\n clear(debug: boolean = false) {\n // Clear memory\n this.memoryCache.clear();\n\n // Clear all cleanup timers\n for (const timer of this.cleanupTimers.values()) {\n clearTimeout(timer);\n }\n this.cleanupTimers.clear();\n\n // Clear localStorage\n this.clearAllStorage();\n\n logIfEnabled('debug', '[Cache] Cleared all entries', debug);\n }\n\n /**\n * Get cache statistics (for debugging)\n */\n inspect() {\n const entries: Record<\n string,\n {\n data: any;\n ageMs: number;\n expiresInMs: number;\n isExpired: boolean;\n source: 'memory' | 'storage';\n }\n > = {};\n\n const now = Date.now();\n\n // Memory entries\n for (const [key, value] of this.memoryCache.entries()) {\n entries[key] = {\n data: value.data,\n ageMs: now - value.timestamp,\n expiresInMs: value.expiresAt - now,\n isExpired: now > value.expiresAt,\n source: 'memory',\n };\n }\n\n // Storage entries not in memory\n for (let i = 0; i < localStorage.length; i++) {\n const storageKey = localStorage.key(i);\n if (storageKey?.startsWith(this.STORAGE_PREFIX)) {\n const key = storageKey.substring(this.STORAGE_PREFIX.length);\n if (!entries[key]) {\n try {\n const entry = JSON.parse(localStorage.getItem(storageKey)!) as CacheEntry<any>;\n entries[key] = {\n data: entry.data,\n ageMs: now - entry.timestamp,\n expiresInMs: entry.expiresAt - now,\n isExpired: now > entry.expiresAt,\n source: 'storage',\n };\n } catch {\n // Ignore parse errors\n }\n }\n }\n }\n\n return {\n totalEntries: Object.keys(entries).length,\n memoryEntries: Array.from(this.memoryCache.keys()).length,\n storageEntries: this.countStorageEntries(),\n entries,\n };\n }\n\n /**\n * Get size of cache in localStorage (approximate)\n */\n getStorageSize(): number {\n let size = 0;\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n const value = localStorage.getItem(key);\n if (value) {\n size += key.length + value.length;\n }\n }\n }\n return size;\n }\n\n // Private methods\n\n private getFromStorage<T>(key: string, debug: boolean = false): CacheEntry<T> | null {\n try {\n const stored = localStorage.getItem(this.STORAGE_PREFIX + key);\n if (!stored) return null;\n\n const entry = JSON.parse(stored) as CacheEntry<T>;\n return entry;\n } catch (error) {\n logIfEnabled('error', '[Cache] Error reading from storage:', debug, error);\n return null;\n }\n }\n\n private setInStorage<T>(key: string, entry: CacheEntry<T>, debug: boolean = false) {\n try {\n localStorage.setItem(this.STORAGE_PREFIX + key, JSON.stringify(entry));\n } catch (error) {\n // Handle quota exceeded\n if (error instanceof DOMException && error.name === 'QuotaExceededError') {\n logIfEnabled('warn', '[Cache] Storage quota exceeded, clearing old entries', debug);\n this.clearOldestStorageEntries(debug);\n // Try again\n try {\n localStorage.setItem(this.STORAGE_PREFIX + key, JSON.stringify(entry));\n } catch (retryError) {\n logIfEnabled('error', '[Cache] Still cannot write to storage after cleanup', debug);\n }\n } else {\n logIfEnabled('error', '[Cache] Error writing to storage:', debug, error);\n }\n }\n }\n\n private removeFromStorage(key: string) {\n localStorage.removeItem(this.STORAGE_PREFIX + key);\n }\n\n private clearAllStorage() {\n const keysToRemove: string[] = [];\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n keysToRemove.push(key);\n }\n }\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n }\n\n private cleanExpiredStorage() {\n const now = Date.now();\n const keysToRemove: string[] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const storageKey = localStorage.key(i);\n if (storageKey?.startsWith(this.STORAGE_PREFIX)) {\n try {\n const entry = JSON.parse(localStorage.getItem(storageKey)!) as CacheEntry<any>;\n if (now > entry.expiresAt) {\n keysToRemove.push(storageKey);\n }\n } catch {\n // Remove corrupted entries\n keysToRemove.push(storageKey);\n }\n }\n }\n\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n if (keysToRemove.length > 0) {\n // Use global log level for internal cleanup operations\n logger.debug(`[Cache] Cleaned up ${keysToRemove.length} expired storage entries`);\n }\n }\n\n private clearOldestStorageEntries(debug: boolean = false) {\n const entries: [string, number][] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n try {\n const entry = JSON.parse(localStorage.getItem(key)!) as CacheEntry<any>;\n entries.push([key, entry.timestamp]);\n } catch {\n // Remove corrupted entries\n localStorage.removeItem(key);\n }\n }\n }\n\n // Sort by timestamp (oldest first) and remove oldest 25%\n entries.sort((a, b) => a[1] - b[1]);\n const toRemove = Math.ceil(entries.length * 0.25);\n entries.slice(0, toRemove).forEach(([key]) => {\n localStorage.removeItem(key);\n });\n\n logIfEnabled('debug', `[Cache] Removed ${toRemove} oldest entries to free space`, debug);\n }\n\n private scheduleCleanup(key: string, delay: number) {\n // Cancel existing cleanup if any\n this.cancelCleanup(key);\n\n // Schedule new cleanup\n const timer = setTimeout(() => {\n this.memoryCache.delete(key);\n this.cleanupTimers.delete(key);\n }, delay);\n\n this.cleanupTimers.set(key, timer);\n }\n\n private cancelCleanup(key: string) {\n const timer = this.cleanupTimers.get(key);\n if (timer) {\n clearTimeout(timer);\n this.cleanupTimers.delete(key);\n }\n }\n\n private matchesPattern(key: string, pattern: string | RegExp): boolean {\n if (typeof pattern === 'string') {\n // Exact match or prefix match\n return key === pattern || key.startsWith(pattern);\n }\n return pattern.test(key);\n }\n\n private countStorageEntries(): number {\n let count = 0;\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n count++;\n }\n }\n return count;\n }\n}\n\n// Singleton instance\nexport const queryCache = new QueryCache();\n\n// Expose for debugging in dev mode\nif (import.meta.env.DEV) {\n (window as any).__queryCache = queryCache;\n // Always log this in dev mode\n logger.debug('[Cache] Debug available: window.__queryCache');\n}\n"],"mappings":";;;AAcA,IAAM,aAAN,MAAiB;CACf,AAAQ,8BAAc,IAAI,KAA8B;CACxD,AAAiB,YAAY,OAAO,KAAK,IAAI,kBAAkB;CAC/D,AAAiB,iBAAiB,aAAa,KAAK,UAAU;CAC9D,AAAiB,gBAAgB;CACjC,AAAQ,gCAAgB,IAAI,KAAqB;CAEjD,cAAc;AAEZ,OAAK,wBAAwB;AAG7B,OAAK,qBAAqB;;;;;CAM5B,AAAQ,yBAAyB;EAC/B,MAAM,eAAe,aAAa,QAAQ,KAAK,cAAc;AAG7D,MAAI,CAAC,cAAc;AAEjB,UAAO,MAAM,iDAAiD;AAC9D,QAAK,iBAAiB;aAGf,iBAAiB,KAAK,WAAW;AAExC,UAAO,MAAM,oCAAoC,aAAa,KAAK,KAAK,YAAY;AACpF,UAAO,MAAM,sDAAsD;AAGnE,QAAK,2BAA2B,aAAa;;AAI/C,eAAa,QAAQ,KAAK,eAAe,KAAK,UAAU;;;;;CAM1D,AAAQ,2BAA2B,aAAqB;EACtD,MAAM,YAAY,aAAa,YAAY;EAC3C,MAAMA,eAAyB,EAAE;AAEjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,UAAU,CAC5B,cAAa,KAAK,IAAI;;AAI1B,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;AAE3D,MAAI,aAAa,SAAS,EAExB,QAAO,MAAM,mBAAmB,aAAa,OAAO,mCAAmC;;;;;CAO3F,IAAO,KAAa,UAAwB,EAAE,EAAY;EACxD,MAAM,MAAM,KAAK,KAAK;EACtB,MAAM,QAAQ,QAAQ,SAAS;EAG/B,MAAM,cAAc,KAAK,YAAY,IAAI,IAAI;AAC7C,MAAI,aAAa;AACf,OAAI,MAAM,YAAY,UACpB,QAAO,YAAY;AAGrB,QAAK,YAAY,OAAO,IAAI;;AAI9B,MAAI,QAAQ,SAAS;GACnB,MAAM,eAAe,KAAK,eAAkB,KAAK,MAAM;AACvD,OAAI,cAAc;AAChB,QAAI,MAAM,aAAa,WAAW;AAEhC,UAAK,YAAY,IAAI,KAAK,aAAa;AACvC,YAAO,aAAa;;AAGtB,SAAK,kBAAkB,IAAI;;;AAI/B,SAAO;;;;;CAMT,IAAO,KAAa,MAAS,UAAwB,EAAE,EAAE;EACvD,MAAM,YAAY,QAAQ,aAAa;EACvC,MAAM,QAAQ,QAAQ,SAAS;EAC/B,MAAMC,QAAuB;GAC3B;GACA,WAAW,KAAK,KAAK;GACrB,WAAW,KAAK,KAAK,GAAG;GACzB;AAGD,OAAK,YAAY,IAAI,KAAK,MAAM;AAGhC,MAAI,QAAQ,QACV,MAAK,aAAa,KAAK,OAAO,MAAM;AAItC,OAAK,gBAAgB,KAAK,UAAU;;;;;CAMtC,WAAW,SAA0B,QAAiB,OAAO;EAC3D,MAAMD,eAAyB,EAAE;AAGjC,OAAK,MAAM,OAAO,KAAK,YAAY,MAAM,CACvC,KAAI,KAAK,eAAe,KAAK,QAAQ,CACnC,cAAa,KAAK,IAAI;AAK1B,eAAa,SAAS,QAAQ;AAC5B,QAAK,YAAY,OAAO,IAAI;AAC5B,QAAK,kBAAkB,IAAI;AAC3B,QAAK,cAAc,IAAI;IACvB;AAEF,eACE,SACA,uBAAuB,aAAa,OAAO,qBAC3C,OACA,QACD;;;;;CAMH,MAAM,QAAiB,OAAO;AAE5B,OAAK,YAAY,OAAO;AAGxB,OAAK,MAAM,SAAS,KAAK,cAAc,QAAQ,CAC7C,cAAa,MAAM;AAErB,OAAK,cAAc,OAAO;AAG1B,OAAK,iBAAiB;AAEtB,eAAa,SAAS,+BAA+B,MAAM;;;;;CAM7D,UAAU;EACR,MAAME,UASF,EAAE;EAEN,MAAM,MAAM,KAAK,KAAK;AAGtB,OAAK,MAAM,CAAC,KAAK,UAAU,KAAK,YAAY,SAAS,CACnD,SAAQ,OAAO;GACb,MAAM,MAAM;GACZ,OAAO,MAAM,MAAM;GACnB,aAAa,MAAM,YAAY;GAC/B,WAAW,MAAM,MAAM;GACvB,QAAQ;GACT;AAIH,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,aAAa,aAAa,IAAI,EAAE;AACtC,OAAI,YAAY,WAAW,KAAK,eAAe,EAAE;IAC/C,MAAM,MAAM,WAAW,UAAU,KAAK,eAAe,OAAO;AAC5D,QAAI,CAAC,QAAQ,KACX,KAAI;KACF,MAAM,QAAQ,KAAK,MAAM,aAAa,QAAQ,WAAW,CAAE;AAC3D,aAAQ,OAAO;MACb,MAAM,MAAM;MACZ,OAAO,MAAM,MAAM;MACnB,aAAa,MAAM,YAAY;MAC/B,WAAW,MAAM,MAAM;MACvB,QAAQ;MACT;YACK;;;AAOd,SAAO;GACL,cAAc,OAAO,KAAK,QAAQ,CAAC;GACnC,eAAe,MAAM,KAAK,KAAK,YAAY,MAAM,CAAC,CAAC;GACnD,gBAAgB,KAAK,qBAAqB;GAC1C;GACD;;;;;CAMH,iBAAyB;EACvB,IAAI,OAAO;AACX,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,EAAE;IACxC,MAAM,QAAQ,aAAa,QAAQ,IAAI;AACvC,QAAI,MACF,SAAQ,IAAI,SAAS,MAAM;;;AAIjC,SAAO;;CAKT,AAAQ,eAAkB,KAAa,QAAiB,OAA6B;AACnF,MAAI;GACF,MAAM,SAAS,aAAa,QAAQ,KAAK,iBAAiB,IAAI;AAC9D,OAAI,CAAC,OAAQ,QAAO;AAGpB,UADc,KAAK,MAAM,OAAO;WAEzB,OAAO;AACd,gBAAa,SAAS,uCAAuC,OAAO,MAAM;AAC1E,UAAO;;;CAIX,AAAQ,aAAgB,KAAa,OAAsB,QAAiB,OAAO;AACjF,MAAI;AACF,gBAAa,QAAQ,KAAK,iBAAiB,KAAK,KAAK,UAAU,MAAM,CAAC;WAC/D,OAAO;AAEd,OAAI,iBAAiB,gBAAgB,MAAM,SAAS,sBAAsB;AACxE,iBAAa,QAAQ,wDAAwD,MAAM;AACnF,SAAK,0BAA0B,MAAM;AAErC,QAAI;AACF,kBAAa,QAAQ,KAAK,iBAAiB,KAAK,KAAK,UAAU,MAAM,CAAC;aAC/D,YAAY;AACnB,kBAAa,SAAS,uDAAuD,MAAM;;SAGrF,cAAa,SAAS,qCAAqC,OAAO,MAAM;;;CAK9E,AAAQ,kBAAkB,KAAa;AACrC,eAAa,WAAW,KAAK,iBAAiB,IAAI;;CAGpD,AAAQ,kBAAkB;EACxB,MAAMF,eAAyB,EAAE;AACjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,CACtC,cAAa,KAAK,IAAI;;AAG1B,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;;CAG7D,AAAQ,sBAAsB;EAC5B,MAAM,MAAM,KAAK,KAAK;EACtB,MAAMA,eAAyB,EAAE;AAEjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,aAAa,aAAa,IAAI,EAAE;AACtC,OAAI,YAAY,WAAW,KAAK,eAAe,CAC7C,KAAI;AAEF,QAAI,MADU,KAAK,MAAM,aAAa,QAAQ,WAAW,CAAE,CAC3C,UACd,cAAa,KAAK,WAAW;WAEzB;AAEN,iBAAa,KAAK,WAAW;;;AAKnC,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;AAC3D,MAAI,aAAa,SAAS,EAExB,QAAO,MAAM,sBAAsB,aAAa,OAAO,0BAA0B;;CAIrF,AAAQ,0BAA0B,QAAiB,OAAO;EACxD,MAAMG,UAA8B,EAAE;AAEtC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,CACtC,KAAI;IACF,MAAM,QAAQ,KAAK,MAAM,aAAa,QAAQ,IAAI,CAAE;AACpD,YAAQ,KAAK,CAAC,KAAK,MAAM,UAAU,CAAC;WAC9B;AAEN,iBAAa,WAAW,IAAI;;;AAMlC,UAAQ,MAAM,GAAG,MAAM,EAAE,KAAK,EAAE,GAAG;EACnC,MAAM,WAAW,KAAK,KAAK,QAAQ,SAAS,IAAK;AACjD,UAAQ,MAAM,GAAG,SAAS,CAAC,SAAS,CAAC,SAAS;AAC5C,gBAAa,WAAW,IAAI;IAC5B;AAEF,eAAa,SAAS,mBAAmB,SAAS,gCAAgC,MAAM;;CAG1F,AAAQ,gBAAgB,KAAa,OAAe;AAElD,OAAK,cAAc,IAAI;EAGvB,MAAM,QAAQ,iBAAiB;AAC7B,QAAK,YAAY,OAAO,IAAI;AAC5B,QAAK,cAAc,OAAO,IAAI;KAC7B,MAAM;AAET,OAAK,cAAc,IAAI,KAAK,MAAM;;CAGpC,AAAQ,cAAc,KAAa;EACjC,MAAM,QAAQ,KAAK,cAAc,IAAI,IAAI;AACzC,MAAI,OAAO;AACT,gBAAa,MAAM;AACnB,QAAK,cAAc,OAAO,IAAI;;;CAIlC,AAAQ,eAAe,KAAa,SAAmC;AACrE,MAAI,OAAO,YAAY,SAErB,QAAO,QAAQ,WAAW,IAAI,WAAW,QAAQ;AAEnD,SAAO,QAAQ,KAAK,IAAI;;CAG1B,AAAQ,sBAA8B;EACpC,IAAI,QAAQ;AACZ,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,IAEvC,KADY,aAAa,IAAI,EAAE,EACtB,WAAW,KAAK,eAAe,CACtC;AAGJ,SAAO;;;AAKX,MAAa,aAAa,IAAI,YAAY;AAG1C,IAAI,OAAO,KAAK,IAAI,KAAK;AACvB,CAAC,OAAe,eAAe;AAE/B,QAAO,MAAM,+CAA+C"}
1
+ {"version":3,"file":"useQueryCache-alzaRWEb.js","names":["keysToRemove: string[]","entry: CacheEntry<T>","entries: Record<\n string,\n {\n data: any;\n ageMs: number;\n expiresInMs: number;\n isExpired: boolean;\n source: 'memory' | 'storage';\n }\n >","entries: [string, number][]"],"sources":["../src/composables/useQueryCache.ts"],"sourcesContent":["import { logger, logIfEnabled } from '../utils/logger';\n\ninterface CacheEntry<T> {\n data: T;\n timestamp: number;\n expiresAt: number;\n}\n\ninterface CacheOptions {\n staleTime?: number; // How long data is fresh (ms), default 5 minutes\n persist?: boolean; // Save to localStorage\n debug?: boolean; // Enable/disable debug logging for this cache operation (default: false)\n}\n\nclass QueryCache {\n private memoryCache = new Map<string, CacheEntry<any>>();\n private readonly BUILD_TAG = import.meta.env.VITE_BUILD_TAG || 'dev';\n private readonly STORAGE_PREFIX = `rpc-cache:${this.BUILD_TAG}:`;\n private readonly BUILD_TAG_KEY = 'rpc-cache-build-tag';\n private cleanupTimers = new Map<string, number>();\n\n constructor() {\n // Check if this is a new deployment and clear old cache\n this.handleDeploymentChange();\n\n // Clean up expired localStorage entries on init\n this.cleanExpiredStorage();\n }\n\n /**\n * Detect deployment changes and clear old cache\n */\n private handleDeploymentChange() {\n const lastBuildTag = localStorage.getItem(this.BUILD_TAG_KEY);\n\n // If build tag is missing, clear all cache (first load or manual clear)\n if (!lastBuildTag) {\n // Use global log level for deployment change detection\n logger.debug('[Cache] Build tag missing - clearing all cache');\n this.clearAllStorage();\n }\n // If deployment changed, clear old cache from previous build\n else if (lastBuildTag !== this.BUILD_TAG) {\n // Use global log level for deployment change detection\n logger.debug(`[Cache] New deployment detected: ${lastBuildTag} → ${this.BUILD_TAG}`);\n logger.debug('[Cache] Clearing old cache from previous deployment');\n\n // Clear all old cache entries (from previous build tag)\n this.clearAllOldDeploymentCache(lastBuildTag);\n }\n\n // Store current build tag\n localStorage.setItem(this.BUILD_TAG_KEY, this.BUILD_TAG);\n }\n\n /**\n * Clear cache from previous deployment\n */\n private clearAllOldDeploymentCache(oldBuildTag: string) {\n const oldPrefix = `rpc-cache:${oldBuildTag}:`;\n const keysToRemove: string[] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(oldPrefix)) {\n keysToRemove.push(key);\n }\n }\n\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n\n if (keysToRemove.length > 0) {\n // Use global log level for deployment change detection\n logger.debug(`[Cache] Removed ${keysToRemove.length} entries from previous deployment`);\n }\n }\n\n /**\n * Get data from cache (memory first, then localStorage if persist enabled)\n */\n get<T>(key: string, options: CacheOptions = {}): T | null {\n const now = Date.now();\n const debug = options.debug ?? false;\n\n // 1. Try memory cache first\n const memoryEntry = this.memoryCache.get(key);\n if (memoryEntry) {\n if (now < memoryEntry.expiresAt) {\n return memoryEntry.data as T;\n }\n // Expired in memory\n this.memoryCache.delete(key);\n }\n\n // 2. Try localStorage if persist is enabled\n if (options.persist) {\n const storageEntry = this.getFromStorage<T>(key, debug);\n if (storageEntry) {\n if (now < storageEntry.expiresAt) {\n // Rehydrate to memory cache\n this.memoryCache.set(key, storageEntry);\n return storageEntry.data;\n }\n // Expired in storage\n this.removeFromStorage(key);\n }\n }\n\n return null;\n }\n\n /**\n * Set data in cache (memory and optionally localStorage)\n */\n set<T>(key: string, data: T, options: CacheOptions = {}) {\n const staleTime = options.staleTime ?? 300000; // Default 5 minutes\n const debug = options.debug ?? false;\n const entry: CacheEntry<T> = {\n data,\n timestamp: Date.now(),\n expiresAt: Date.now() + staleTime,\n };\n\n // 1. Set in memory\n this.memoryCache.set(key, entry);\n\n // 2. Persist to localStorage if enabled\n if (options.persist) {\n this.setInStorage(key, entry, debug);\n }\n\n // 3. Schedule automatic cleanup\n this.scheduleCleanup(key, staleTime);\n }\n\n /**\n * Invalidate cache entries matching a pattern\n */\n invalidate(pattern: string | RegExp, debug: boolean = false) {\n const keysToRemove: string[] = [];\n\n // Find matching keys in memory\n for (const key of this.memoryCache.keys()) {\n if (this.matchesPattern(key, pattern)) {\n keysToRemove.push(key);\n }\n }\n\n // Remove from memory and storage\n keysToRemove.forEach((key) => {\n this.memoryCache.delete(key);\n this.removeFromStorage(key);\n this.cancelCleanup(key);\n });\n\n logIfEnabled(\n 'debug',\n `[Cache] Invalidated ${keysToRemove.length} entries matching:`,\n debug,\n pattern,\n );\n }\n\n /**\n * Clear all cache entries\n */\n clear(debug: boolean = false) {\n // Clear memory\n this.memoryCache.clear();\n\n // Clear all cleanup timers\n for (const timer of this.cleanupTimers.values()) {\n clearTimeout(timer);\n }\n this.cleanupTimers.clear();\n\n // Clear localStorage\n this.clearAllStorage();\n\n logIfEnabled('debug', '[Cache] Cleared all entries', debug);\n }\n\n /**\n * Get cache statistics (for debugging)\n */\n inspect() {\n const entries: Record<\n string,\n {\n data: any;\n ageMs: number;\n expiresInMs: number;\n isExpired: boolean;\n source: 'memory' | 'storage';\n }\n > = {};\n\n const now = Date.now();\n\n // Memory entries\n for (const [key, value] of this.memoryCache.entries()) {\n entries[key] = {\n data: value.data,\n ageMs: now - value.timestamp,\n expiresInMs: value.expiresAt - now,\n isExpired: now > value.expiresAt,\n source: 'memory',\n };\n }\n\n // Storage entries not in memory\n for (let i = 0; i < localStorage.length; i++) {\n const storageKey = localStorage.key(i);\n if (storageKey?.startsWith(this.STORAGE_PREFIX)) {\n const key = storageKey.substring(this.STORAGE_PREFIX.length);\n if (!entries[key]) {\n try {\n const entry = JSON.parse(localStorage.getItem(storageKey)!) as CacheEntry<any>;\n entries[key] = {\n data: entry.data,\n ageMs: now - entry.timestamp,\n expiresInMs: entry.expiresAt - now,\n isExpired: now > entry.expiresAt,\n source: 'storage',\n };\n } catch {\n // Ignore parse errors\n }\n }\n }\n }\n\n return {\n totalEntries: Object.keys(entries).length,\n memoryEntries: Array.from(this.memoryCache.keys()).length,\n storageEntries: this.countStorageEntries(),\n entries,\n };\n }\n\n /**\n * Get size of cache in localStorage (approximate)\n */\n getStorageSize(): number {\n let size = 0;\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n const value = localStorage.getItem(key);\n if (value) {\n size += key.length + value.length;\n }\n }\n }\n return size;\n }\n\n // Private methods\n\n private getFromStorage<T>(key: string, debug: boolean = false): CacheEntry<T> | null {\n try {\n const stored = localStorage.getItem(this.STORAGE_PREFIX + key);\n if (!stored) return null;\n\n const entry = JSON.parse(stored) as CacheEntry<T>;\n return entry;\n } catch (error) {\n logIfEnabled('error', '[Cache] Error reading from storage:', debug, error);\n return null;\n }\n }\n\n private setInStorage<T>(key: string, entry: CacheEntry<T>, debug: boolean = false) {\n try {\n localStorage.setItem(this.STORAGE_PREFIX + key, JSON.stringify(entry));\n } catch (error) {\n // Handle quota exceeded\n if (error instanceof DOMException && error.name === 'QuotaExceededError') {\n logIfEnabled('warn', '[Cache] Storage quota exceeded, clearing old entries', debug);\n this.clearOldestStorageEntries(debug);\n // Try again\n try {\n localStorage.setItem(this.STORAGE_PREFIX + key, JSON.stringify(entry));\n } catch (retryError) {\n logIfEnabled('error', '[Cache] Still cannot write to storage after cleanup', debug);\n }\n } else {\n logIfEnabled('error', '[Cache] Error writing to storage:', debug, error);\n }\n }\n }\n\n private removeFromStorage(key: string) {\n localStorage.removeItem(this.STORAGE_PREFIX + key);\n }\n\n private clearAllStorage() {\n const keysToRemove: string[] = [];\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n keysToRemove.push(key);\n }\n }\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n }\n\n private cleanExpiredStorage() {\n const now = Date.now();\n const keysToRemove: string[] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const storageKey = localStorage.key(i);\n if (storageKey?.startsWith(this.STORAGE_PREFIX)) {\n try {\n const entry = JSON.parse(localStorage.getItem(storageKey)!) as CacheEntry<any>;\n if (now > entry.expiresAt) {\n keysToRemove.push(storageKey);\n }\n } catch {\n // Remove corrupted entries\n keysToRemove.push(storageKey);\n }\n }\n }\n\n keysToRemove.forEach((key) => localStorage.removeItem(key));\n if (keysToRemove.length > 0) {\n // Use global log level for internal cleanup operations\n logger.debug(`[Cache] Cleaned up ${keysToRemove.length} expired storage entries`);\n }\n }\n\n private clearOldestStorageEntries(debug: boolean = false) {\n const entries: [string, number][] = [];\n\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n try {\n const entry = JSON.parse(localStorage.getItem(key)!) as CacheEntry<any>;\n entries.push([key, entry.timestamp]);\n } catch {\n // Remove corrupted entries\n localStorage.removeItem(key);\n }\n }\n }\n\n // Sort by timestamp (oldest first) and remove oldest 25%\n entries.sort((a, b) => a[1] - b[1]);\n const toRemove = Math.ceil(entries.length * 0.25);\n entries.slice(0, toRemove).forEach(([key]) => {\n localStorage.removeItem(key);\n });\n\n logIfEnabled('debug', `[Cache] Removed ${toRemove} oldest entries to free space`, debug);\n }\n\n private scheduleCleanup(key: string, delay: number) {\n // Cancel existing cleanup if any\n this.cancelCleanup(key);\n\n // Schedule new cleanup\n const timer = setTimeout(() => {\n this.memoryCache.delete(key);\n this.cleanupTimers.delete(key);\n }, delay);\n\n this.cleanupTimers.set(key, timer);\n }\n\n private cancelCleanup(key: string) {\n const timer = this.cleanupTimers.get(key);\n if (timer) {\n clearTimeout(timer);\n this.cleanupTimers.delete(key);\n }\n }\n\n private matchesPattern(key: string, pattern: string | RegExp): boolean {\n if (typeof pattern === 'string') {\n // Exact match or prefix match\n return key === pattern || key.startsWith(pattern);\n }\n return pattern.test(key);\n }\n\n private countStorageEntries(): number {\n let count = 0;\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (key?.startsWith(this.STORAGE_PREFIX)) {\n count++;\n }\n }\n return count;\n }\n}\n\n// Singleton instance\nexport const queryCache = new QueryCache();\n\n// Expose for debugging in dev mode\nif (import.meta.env.DEV) {\n (window as any).__queryCache = queryCache;\n // Always log this in dev mode\n logger.debug('[Cache] Debug available: window.__queryCache');\n}\n"],"mappings":";;;AAcA,IAAM,aAAN,MAAiB;CACf,AAAQ,8BAAc,IAAI,KAA8B;CACxD,AAAiB,YAAY,OAAO,KAAK,IAAI,kBAAkB;CAC/D,AAAiB,iBAAiB,aAAa,KAAK,UAAU;CAC9D,AAAiB,gBAAgB;CACjC,AAAQ,gCAAgB,IAAI,KAAqB;CAEjD,cAAc;AAEZ,OAAK,wBAAwB;AAG7B,OAAK,qBAAqB;;;;;CAM5B,AAAQ,yBAAyB;EAC/B,MAAM,eAAe,aAAa,QAAQ,KAAK,cAAc;AAG7D,MAAI,CAAC,cAAc;AAEjB,UAAO,MAAM,iDAAiD;AAC9D,QAAK,iBAAiB;aAGf,iBAAiB,KAAK,WAAW;AAExC,UAAO,MAAM,oCAAoC,aAAa,KAAK,KAAK,YAAY;AACpF,UAAO,MAAM,sDAAsD;AAGnE,QAAK,2BAA2B,aAAa;;AAI/C,eAAa,QAAQ,KAAK,eAAe,KAAK,UAAU;;;;;CAM1D,AAAQ,2BAA2B,aAAqB;EACtD,MAAM,YAAY,aAAa,YAAY;EAC3C,MAAMA,eAAyB,EAAE;AAEjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,UAAU,CAC5B,cAAa,KAAK,IAAI;;AAI1B,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;AAE3D,MAAI,aAAa,SAAS,EAExB,QAAO,MAAM,mBAAmB,aAAa,OAAO,mCAAmC;;;;;CAO3F,IAAO,KAAa,UAAwB,EAAE,EAAY;EACxD,MAAM,MAAM,KAAK,KAAK;EACtB,MAAM,QAAQ,QAAQ,SAAS;EAG/B,MAAM,cAAc,KAAK,YAAY,IAAI,IAAI;AAC7C,MAAI,aAAa;AACf,OAAI,MAAM,YAAY,UACpB,QAAO,YAAY;AAGrB,QAAK,YAAY,OAAO,IAAI;;AAI9B,MAAI,QAAQ,SAAS;GACnB,MAAM,eAAe,KAAK,eAAkB,KAAK,MAAM;AACvD,OAAI,cAAc;AAChB,QAAI,MAAM,aAAa,WAAW;AAEhC,UAAK,YAAY,IAAI,KAAK,aAAa;AACvC,YAAO,aAAa;;AAGtB,SAAK,kBAAkB,IAAI;;;AAI/B,SAAO;;;;;CAMT,IAAO,KAAa,MAAS,UAAwB,EAAE,EAAE;EACvD,MAAM,YAAY,QAAQ,aAAa;EACvC,MAAM,QAAQ,QAAQ,SAAS;EAC/B,MAAMC,QAAuB;GAC3B;GACA,WAAW,KAAK,KAAK;GACrB,WAAW,KAAK,KAAK,GAAG;GACzB;AAGD,OAAK,YAAY,IAAI,KAAK,MAAM;AAGhC,MAAI,QAAQ,QACV,MAAK,aAAa,KAAK,OAAO,MAAM;AAItC,OAAK,gBAAgB,KAAK,UAAU;;;;;CAMtC,WAAW,SAA0B,QAAiB,OAAO;EAC3D,MAAMD,eAAyB,EAAE;AAGjC,OAAK,MAAM,OAAO,KAAK,YAAY,MAAM,CACvC,KAAI,KAAK,eAAe,KAAK,QAAQ,CACnC,cAAa,KAAK,IAAI;AAK1B,eAAa,SAAS,QAAQ;AAC5B,QAAK,YAAY,OAAO,IAAI;AAC5B,QAAK,kBAAkB,IAAI;AAC3B,QAAK,cAAc,IAAI;IACvB;AAEF,eACE,SACA,uBAAuB,aAAa,OAAO,qBAC3C,OACA,QACD;;;;;CAMH,MAAM,QAAiB,OAAO;AAE5B,OAAK,YAAY,OAAO;AAGxB,OAAK,MAAM,SAAS,KAAK,cAAc,QAAQ,CAC7C,cAAa,MAAM;AAErB,OAAK,cAAc,OAAO;AAG1B,OAAK,iBAAiB;AAEtB,eAAa,SAAS,+BAA+B,MAAM;;;;;CAM7D,UAAU;EACR,MAAME,UASF,EAAE;EAEN,MAAM,MAAM,KAAK,KAAK;AAGtB,OAAK,MAAM,CAAC,KAAK,UAAU,KAAK,YAAY,SAAS,CACnD,SAAQ,OAAO;GACb,MAAM,MAAM;GACZ,OAAO,MAAM,MAAM;GACnB,aAAa,MAAM,YAAY;GAC/B,WAAW,MAAM,MAAM;GACvB,QAAQ;GACT;AAIH,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,aAAa,aAAa,IAAI,EAAE;AACtC,OAAI,YAAY,WAAW,KAAK,eAAe,EAAE;IAC/C,MAAM,MAAM,WAAW,UAAU,KAAK,eAAe,OAAO;AAC5D,QAAI,CAAC,QAAQ,KACX,KAAI;KACF,MAAM,QAAQ,KAAK,MAAM,aAAa,QAAQ,WAAW,CAAE;AAC3D,aAAQ,OAAO;MACb,MAAM,MAAM;MACZ,OAAO,MAAM,MAAM;MACnB,aAAa,MAAM,YAAY;MAC/B,WAAW,MAAM,MAAM;MACvB,QAAQ;MACT;YACK;;;AAOd,SAAO;GACL,cAAc,OAAO,KAAK,QAAQ,CAAC;GACnC,eAAe,MAAM,KAAK,KAAK,YAAY,MAAM,CAAC,CAAC;GACnD,gBAAgB,KAAK,qBAAqB;GAC1C;GACD;;;;;CAMH,iBAAyB;EACvB,IAAI,OAAO;AACX,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,EAAE;IACxC,MAAM,QAAQ,aAAa,QAAQ,IAAI;AACvC,QAAI,MACF,SAAQ,IAAI,SAAS,MAAM;;;AAIjC,SAAO;;CAKT,AAAQ,eAAkB,KAAa,QAAiB,OAA6B;AACnF,MAAI;GACF,MAAM,SAAS,aAAa,QAAQ,KAAK,iBAAiB,IAAI;AAC9D,OAAI,CAAC,OAAQ,QAAO;AAGpB,UADc,KAAK,MAAM,OAAO;WAEzB,OAAO;AACd,gBAAa,SAAS,uCAAuC,OAAO,MAAM;AAC1E,UAAO;;;CAIX,AAAQ,aAAgB,KAAa,OAAsB,QAAiB,OAAO;AACjF,MAAI;AACF,gBAAa,QAAQ,KAAK,iBAAiB,KAAK,KAAK,UAAU,MAAM,CAAC;WAC/D,OAAO;AAEd,OAAI,iBAAiB,gBAAgB,MAAM,SAAS,sBAAsB;AACxE,iBAAa,QAAQ,wDAAwD,MAAM;AACnF,SAAK,0BAA0B,MAAM;AAErC,QAAI;AACF,kBAAa,QAAQ,KAAK,iBAAiB,KAAK,KAAK,UAAU,MAAM,CAAC;aAC/D,YAAY;AACnB,kBAAa,SAAS,uDAAuD,MAAM;;SAGrF,cAAa,SAAS,qCAAqC,OAAO,MAAM;;;CAK9E,AAAQ,kBAAkB,KAAa;AACrC,eAAa,WAAW,KAAK,iBAAiB,IAAI;;CAGpD,AAAQ,kBAAkB;EACxB,MAAMF,eAAyB,EAAE;AACjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,CACtC,cAAa,KAAK,IAAI;;AAG1B,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;;CAG7D,AAAQ,sBAAsB;EAC5B,MAAM,MAAM,KAAK,KAAK;EACtB,MAAMA,eAAyB,EAAE;AAEjC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,aAAa,aAAa,IAAI,EAAE;AACtC,OAAI,YAAY,WAAW,KAAK,eAAe,CAC7C,KAAI;AAEF,QAAI,MADU,KAAK,MAAM,aAAa,QAAQ,WAAW,CAAE,CAC3C,UACd,cAAa,KAAK,WAAW;WAEzB;AAEN,iBAAa,KAAK,WAAW;;;AAKnC,eAAa,SAAS,QAAQ,aAAa,WAAW,IAAI,CAAC;AAC3D,MAAI,aAAa,SAAS,EAExB,QAAO,MAAM,sBAAsB,aAAa,OAAO,0BAA0B;;CAIrF,AAAQ,0BAA0B,QAAiB,OAAO;EACxD,MAAMG,UAA8B,EAAE;AAEtC,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;GAC5C,MAAM,MAAM,aAAa,IAAI,EAAE;AAC/B,OAAI,KAAK,WAAW,KAAK,eAAe,CACtC,KAAI;IACF,MAAM,QAAQ,KAAK,MAAM,aAAa,QAAQ,IAAI,CAAE;AACpD,YAAQ,KAAK,CAAC,KAAK,MAAM,UAAU,CAAC;WAC9B;AAEN,iBAAa,WAAW,IAAI;;;AAMlC,UAAQ,MAAM,GAAG,MAAM,EAAE,KAAK,EAAE,GAAG;EACnC,MAAM,WAAW,KAAK,KAAK,QAAQ,SAAS,IAAK;AACjD,UAAQ,MAAM,GAAG,SAAS,CAAC,SAAS,CAAC,SAAS;AAC5C,gBAAa,WAAW,IAAI;IAC5B;AAEF,eAAa,SAAS,mBAAmB,SAAS,gCAAgC,MAAM;;CAG1F,AAAQ,gBAAgB,KAAa,OAAe;AAElD,OAAK,cAAc,IAAI;EAGvB,MAAM,QAAQ,iBAAiB;AAC7B,QAAK,YAAY,OAAO,IAAI;AAC5B,QAAK,cAAc,OAAO,IAAI;KAC7B,MAAM;AAET,OAAK,cAAc,IAAI,KAAK,MAAM;;CAGpC,AAAQ,cAAc,KAAa;EACjC,MAAM,QAAQ,KAAK,cAAc,IAAI,IAAI;AACzC,MAAI,OAAO;AACT,gBAAa,MAAM;AACnB,QAAK,cAAc,OAAO,IAAI;;;CAIlC,AAAQ,eAAe,KAAa,SAAmC;AACrE,MAAI,OAAO,YAAY,SAErB,QAAO,QAAQ,WAAW,IAAI,WAAW,QAAQ;AAEnD,SAAO,QAAQ,KAAK,IAAI;;CAG1B,AAAQ,sBAA8B;EACpC,IAAI,QAAQ;AACZ,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,QAAQ,IAEvC,KADY,aAAa,IAAI,EAAE,EACtB,WAAW,KAAK,eAAe,CACtC;AAGJ,SAAO;;;AAKX,MAAa,aAAa,IAAI,YAAY;AAG1C,IAAI,OAAO,KAAK,IAAI,KAAK;AACvB,CAAC,OAAe,eAAe;AAE/B,QAAO,MAAM,+CAA+C"}
@@ -63,4 +63,4 @@ function withBackLink(path, backLink, backLinkLabel) {
63
63
 
64
64
  //#endregion
65
65
  export { withBackLink as a, setEmailVerificationReturnUrl as i, getBackLinkFromRoute as n, withReturnUrl as o, getValidReturnUrl as r, getAndClearEmailVerificationReturnUrl as t };
66
- //# sourceMappingURL=useReturnUrl-qFeazn-G.js.map
66
+ //# sourceMappingURL=useReturnUrl-B5V3SJf5.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"useReturnUrl-qFeazn-G.js","names":[],"sources":["../src/utils/useReturnUrl.ts"],"sourcesContent":["import type { RouteLocationNormalizedLoaded } from 'vue-router';\n\n/** Storage key for return URL when awaiting email verification from signup (strict mode). */\nexport const EMAIL_VERIFICATION_RETURN_URL_KEY = 'dragoncore_email_verification_return_url';\n\n/**\n * Store return URL for post-verification redirect. Uses localStorage (not sessionStorage)\n * so the verification link opened in a new tab can access it.\n */\nexport function setEmailVerificationReturnUrl(url: string): void {\n if (!url.startsWith('/') || url.startsWith('/auth/')) return;\n localStorage.setItem(EMAIL_VERIFICATION_RETURN_URL_KEY, url);\n}\n\nexport function getAndClearEmailVerificationReturnUrl(): string | null {\n const url = localStorage.getItem(EMAIL_VERIFICATION_RETURN_URL_KEY);\n localStorage.removeItem(EMAIL_VERIFICATION_RETURN_URL_KEY);\n return url && url.startsWith('/') && !url.startsWith('/auth/') ? url : null;\n}\n\n/**\n * Validates a return URL: must be a relative path starting with / and not /auth/\n * to avoid redirect loops and external URLs.\n */\nexport function getValidReturnUrl(\n route: RouteLocationNormalizedLoaded,\n defaultPath: string,\n): string {\n const returnUrl = route.query.returnUrl as string | undefined;\n if (!returnUrl) return defaultPath;\n if (returnUrl.startsWith('/') && !returnUrl.startsWith('/auth/')) {\n return returnUrl;\n }\n return defaultPath;\n}\n\n/**\n * Builds a path string with returnUrl preserved in query params.\n * Use when linking to login, logout, etc. from a page that has returnUrl.\n */\nexport function withReturnUrl(path: string, returnUrl: string | undefined): string {\n if (!returnUrl || !returnUrl.startsWith('/') || returnUrl.startsWith('/auth/')) {\n return path;\n }\n const sep = path.includes('?') ? '&' : '?';\n return `${path}${sep}returnUrl=${encodeURIComponent(returnUrl)}`;\n}\n\n/** Same validation as returnUrl: relative path, not /auth/ */\nfunction isValidBackLinkPath(path: string): boolean {\n return path.startsWith('/') && !path.startsWith('/auth/');\n}\n\n/**\n * Extracts a valid back link from route query params.\n * Supports backLink (path) and backLinkLabel (optional label).\n */\nexport function getBackLinkFromRoute(\n route: RouteLocationNormalizedLoaded,\n): { to: string; label?: string } | null {\n const path = route.query.backLink;\n const raw =\n typeof path === 'string' ? path : Array.isArray(path) ? path[0] ?? undefined : undefined;\n if (!raw || typeof raw !== 'string' || !isValidBackLinkPath(raw)) return null;\n const label = route.query.backLinkLabel;\n const labelStr =\n typeof label === 'string' ? label : Array.isArray(label) ? label[0] ?? undefined : undefined;\n return { to: raw, label: labelStr };\n}\n\n/**\n * Appends backLink (and optional backLinkLabel) to a path.\n * Use when linking to auth pages so the Auth layout shows a back link.\n */\nexport function withBackLink(\n path: string,\n backLink: string,\n backLinkLabel?: string,\n): string {\n if (!backLink || !isValidBackLinkPath(backLink)) return path;\n const sep = path.includes('?') ? '&' : '?';\n let result = `${path}${sep}backLink=${encodeURIComponent(backLink)}`;\n if (backLinkLabel) {\n result += `&backLinkLabel=${encodeURIComponent(backLinkLabel)}`;\n }\n return result;\n}\n"],"mappings":";;AAGA,MAAa,oCAAoC;;;;;AAMjD,SAAgB,8BAA8B,KAAmB;AAC/D,KAAI,CAAC,IAAI,WAAW,IAAI,IAAI,IAAI,WAAW,SAAS,CAAE;AACtD,cAAa,QAAQ,mCAAmC,IAAI;;AAG9D,SAAgB,wCAAuD;CACrE,MAAM,MAAM,aAAa,QAAQ,kCAAkC;AACnE,cAAa,WAAW,kCAAkC;AAC1D,QAAO,OAAO,IAAI,WAAW,IAAI,IAAI,CAAC,IAAI,WAAW,SAAS,GAAG,MAAM;;;;;;AAOzE,SAAgB,kBACd,OACA,aACQ;CACR,MAAM,YAAY,MAAM,MAAM;AAC9B,KAAI,CAAC,UAAW,QAAO;AACvB,KAAI,UAAU,WAAW,IAAI,IAAI,CAAC,UAAU,WAAW,SAAS,CAC9D,QAAO;AAET,QAAO;;;;;;AAOT,SAAgB,cAAc,MAAc,WAAuC;AACjF,KAAI,CAAC,aAAa,CAAC,UAAU,WAAW,IAAI,IAAI,UAAU,WAAW,SAAS,CAC5E,QAAO;AAGT,QAAO,GAAG,OADE,KAAK,SAAS,IAAI,GAAG,MAAM,IAClB,YAAY,mBAAmB,UAAU;;;AAIhE,SAAS,oBAAoB,MAAuB;AAClD,QAAO,KAAK,WAAW,IAAI,IAAI,CAAC,KAAK,WAAW,SAAS;;;;;;AAO3D,SAAgB,qBACd,OACuC;CACvC,MAAM,OAAO,MAAM,MAAM;CACzB,MAAM,MACJ,OAAO,SAAS,WAAW,OAAO,MAAM,QAAQ,KAAK,GAAG,KAAK,MAAM,SAAY;AACjF,KAAI,CAAC,OAAO,OAAO,QAAQ,YAAY,CAAC,oBAAoB,IAAI,CAAE,QAAO;CACzE,MAAM,QAAQ,MAAM,MAAM;AAG1B,QAAO;EAAE,IAAI;EAAK,OADhB,OAAO,UAAU,WAAW,QAAQ,MAAM,QAAQ,MAAM,GAAG,MAAM,MAAM,SAAY;EAClD;;;;;;AAOrC,SAAgB,aACd,MACA,UACA,eACQ;AACR,KAAI,CAAC,YAAY,CAAC,oBAAoB,SAAS,CAAE,QAAO;CAExD,IAAI,SAAS,GAAG,OADJ,KAAK,SAAS,IAAI,GAAG,MAAM,IACZ,WAAW,mBAAmB,SAAS;AAClE,KAAI,cACF,WAAU,kBAAkB,mBAAmB,cAAc;AAE/D,QAAO"}
1
+ {"version":3,"file":"useReturnUrl-B5V3SJf5.js","names":[],"sources":["../src/utils/useReturnUrl.ts"],"sourcesContent":["import type { RouteLocationNormalizedLoaded } from 'vue-router';\n\n/** Storage key for return URL when awaiting email verification from signup (strict mode). */\nexport const EMAIL_VERIFICATION_RETURN_URL_KEY = 'dragoncore_email_verification_return_url';\n\n/**\n * Store return URL for post-verification redirect. Uses localStorage (not sessionStorage)\n * so the verification link opened in a new tab can access it.\n */\nexport function setEmailVerificationReturnUrl(url: string): void {\n if (!url.startsWith('/') || url.startsWith('/auth/')) return;\n localStorage.setItem(EMAIL_VERIFICATION_RETURN_URL_KEY, url);\n}\n\nexport function getAndClearEmailVerificationReturnUrl(): string | null {\n const url = localStorage.getItem(EMAIL_VERIFICATION_RETURN_URL_KEY);\n localStorage.removeItem(EMAIL_VERIFICATION_RETURN_URL_KEY);\n return url && url.startsWith('/') && !url.startsWith('/auth/') ? url : null;\n}\n\n/**\n * Validates a return URL: must be a relative path starting with / and not /auth/\n * to avoid redirect loops and external URLs.\n */\nexport function getValidReturnUrl(\n route: RouteLocationNormalizedLoaded,\n defaultPath: string,\n): string {\n const returnUrl = route.query.returnUrl as string | undefined;\n if (!returnUrl) return defaultPath;\n if (returnUrl.startsWith('/') && !returnUrl.startsWith('/auth/')) {\n return returnUrl;\n }\n return defaultPath;\n}\n\n/**\n * Builds a path string with returnUrl preserved in query params.\n * Use when linking to login, logout, etc. from a page that has returnUrl.\n */\nexport function withReturnUrl(path: string, returnUrl: string | undefined): string {\n if (!returnUrl || !returnUrl.startsWith('/') || returnUrl.startsWith('/auth/')) {\n return path;\n }\n const sep = path.includes('?') ? '&' : '?';\n return `${path}${sep}returnUrl=${encodeURIComponent(returnUrl)}`;\n}\n\n/** Same validation as returnUrl: relative path, not /auth/ */\nfunction isValidBackLinkPath(path: string): boolean {\n return path.startsWith('/') && !path.startsWith('/auth/');\n}\n\n/**\n * Extracts a valid back link from route query params.\n * Supports backLink (path) and backLinkLabel (optional label).\n */\nexport function getBackLinkFromRoute(\n route: RouteLocationNormalizedLoaded,\n): { to: string; label?: string } | null {\n const path = route.query.backLink;\n const raw =\n typeof path === 'string' ? path : Array.isArray(path) ? path[0] ?? undefined : undefined;\n if (!raw || typeof raw !== 'string' || !isValidBackLinkPath(raw)) return null;\n const label = route.query.backLinkLabel;\n const labelStr =\n typeof label === 'string' ? label : Array.isArray(label) ? label[0] ?? undefined : undefined;\n return { to: raw, label: labelStr };\n}\n\n/**\n * Appends backLink (and optional backLinkLabel) to a path.\n * Use when linking to auth pages so the Auth layout shows a back link.\n */\nexport function withBackLink(\n path: string,\n backLink: string,\n backLinkLabel?: string,\n): string {\n if (!backLink || !isValidBackLinkPath(backLink)) return path;\n const sep = path.includes('?') ? '&' : '?';\n let result = `${path}${sep}backLink=${encodeURIComponent(backLink)}`;\n if (backLinkLabel) {\n result += `&backLinkLabel=${encodeURIComponent(backLinkLabel)}`;\n }\n return result;\n}\n"],"mappings":";;AAGA,MAAa,oCAAoC;;;;;AAMjD,SAAgB,8BAA8B,KAAmB;AAC/D,KAAI,CAAC,IAAI,WAAW,IAAI,IAAI,IAAI,WAAW,SAAS,CAAE;AACtD,cAAa,QAAQ,mCAAmC,IAAI;;AAG9D,SAAgB,wCAAuD;CACrE,MAAM,MAAM,aAAa,QAAQ,kCAAkC;AACnE,cAAa,WAAW,kCAAkC;AAC1D,QAAO,OAAO,IAAI,WAAW,IAAI,IAAI,CAAC,IAAI,WAAW,SAAS,GAAG,MAAM;;;;;;AAOzE,SAAgB,kBACd,OACA,aACQ;CACR,MAAM,YAAY,MAAM,MAAM;AAC9B,KAAI,CAAC,UAAW,QAAO;AACvB,KAAI,UAAU,WAAW,IAAI,IAAI,CAAC,UAAU,WAAW,SAAS,CAC9D,QAAO;AAET,QAAO;;;;;;AAOT,SAAgB,cAAc,MAAc,WAAuC;AACjF,KAAI,CAAC,aAAa,CAAC,UAAU,WAAW,IAAI,IAAI,UAAU,WAAW,SAAS,CAC5E,QAAO;AAGT,QAAO,GAAG,OADE,KAAK,SAAS,IAAI,GAAG,MAAM,IAClB,YAAY,mBAAmB,UAAU;;;AAIhE,SAAS,oBAAoB,MAAuB;AAClD,QAAO,KAAK,WAAW,IAAI,IAAI,CAAC,KAAK,WAAW,SAAS;;;;;;AAO3D,SAAgB,qBACd,OACuC;CACvC,MAAM,OAAO,MAAM,MAAM;CACzB,MAAM,MACJ,OAAO,SAAS,WAAW,OAAO,MAAM,QAAQ,KAAK,GAAG,KAAK,MAAM,SAAY;AACjF,KAAI,CAAC,OAAO,OAAO,QAAQ,YAAY,CAAC,oBAAoB,IAAI,CAAE,QAAO;CACzE,MAAM,QAAQ,MAAM,MAAM;AAG1B,QAAO;EAAE,IAAI;EAAK,OADhB,OAAO,UAAU,WAAW,QAAQ,MAAM,QAAQ,MAAM,GAAG,MAAM,MAAM,SAAY;EAClD;;;;;;AAOrC,SAAgB,aACd,MACA,UACA,eACQ;AACR,KAAI,CAAC,YAAY,CAAC,oBAAoB,SAAS,CAAE,QAAO;CAExD,IAAI,SAAS,GAAG,OADJ,KAAK,SAAS,IAAI,GAAG,MAAM,IACZ,WAAW,mBAAmB,SAAS;AAClE,KAAI,cACF,WAAU,kBAAkB,mBAAmB,cAAc;AAE/D,QAAO"}
@@ -16,8 +16,7 @@ function useEnv() {
16
16
  },
17
17
  allowUserSignup: import.meta.env.VITE_ALLOW_USER_SIGNUP === "true",
18
18
  emailVerificationMode: import.meta.env.VITE_EMAIL_VERIFICATION_MODE ?? "disabled",
19
- maxAttachmentFileSize: import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB ? parseInt(import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB, 10) * 1024 * 1024 : 50 * 1024 * 1024,
20
- requireConsentForExistingUsers: import.meta.env.VITE_REQUIRE_CONSENT_FOR_EXISTING_USERS === "true"
19
+ maxAttachmentFileSize: import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB ? parseInt(import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB, 10) * 1024 * 1024 : 50 * 1024 * 1024
21
20
  });
22
21
  }
23
22
 
@@ -392,191 +391,6 @@ function createAppBatch$1(options) {
392
391
  }));
393
392
  }
394
393
 
395
- //#endregion
396
- //#region src/utils/EnhancedRefreshTokenHandler.ts
397
- var EnhancedRefreshTokenHandler = class {
398
- refreshState = {
399
- isRefreshing: false,
400
- pendingPromise: null,
401
- lastAttempt: 0,
402
- failureCount: 0
403
- };
404
- async performRefreshWithStrategies() {
405
- if (this.refreshState.isRefreshing && this.refreshState.pendingPromise) {
406
- logger.debug("[EnhancedRefresh] Refresh already in progress, returning existing promise");
407
- return this.refreshState.pendingPromise;
408
- }
409
- this.refreshState.isRefreshing = true;
410
- this.refreshState.pendingPromise = this.executeRefreshStrategies();
411
- try {
412
- const tokens = await this.refreshState.pendingPromise;
413
- this.refreshState.failureCount = 0;
414
- logger.debug("[EnhancedRefresh] Refresh completed successfully");
415
- return tokens;
416
- } catch (error) {
417
- this.refreshState.failureCount++;
418
- logger.error("[EnhancedRefresh] All refresh strategies failed:", error);
419
- throw error;
420
- } finally {
421
- this.refreshState.isRefreshing = false;
422
- this.refreshState.pendingPromise = null;
423
- this.refreshState.lastAttempt = Date.now();
424
- }
425
- }
426
- async executeRefreshStrategies() {
427
- const strategies = [
428
- {
429
- name: "Direct RefreshToken",
430
- execute: () => this.directRefreshToken()
431
- },
432
- {
433
- name: "Warmup + Retry RefreshToken",
434
- execute: () => this.warmupAndRetryRefresh()
435
- },
436
- {
437
- name: "Alternative Domain RefreshToken",
438
- execute: () => this.alternativeDomainRefresh()
439
- }
440
- ];
441
- let lastError;
442
- let partialSuccess = false;
443
- for (const [index, strategy] of strategies.entries()) try {
444
- logger.debug(`[EnhancedRefresh] Attempting strategy ${index + 1}: ${strategy.name}`);
445
- const tokens = await strategy.execute();
446
- logger.debug(`[EnhancedRefresh] Strategy ${index + 1} (${strategy.name}) succeeded`);
447
- return tokens;
448
- } catch (error) {
449
- lastError = error;
450
- logger.debug(`[EnhancedRefresh] Strategy ${index + 1} (${strategy.name}) failed:`, error);
451
- const errorMessage = error instanceof Error ? error.message : String(error);
452
- if (!errorMessage.includes("No refresh_token") && !errorMessage.includes("REFRESH_TOKEN_EXPIRED")) partialSuccess = true;
453
- if (index < strategies.length - 1) {
454
- const backoffDelay = 100 * (index + 1);
455
- await this.delay(backoffDelay);
456
- }
457
- }
458
- if (lastError && partialSuccess) {
459
- const enhancedError = lastError;
460
- enhancedError.partialSuccess = true;
461
- enhancedError.isTemporaryFailure = true;
462
- }
463
- throw lastError;
464
- }
465
- async directRefreshToken() {
466
- try {
467
- const tokens = await createAppBatch$1({
468
- credentials: "include",
469
- trackedSegment: "userSessions.refreshToken"
470
- }).userSessions.refreshToken();
471
- if (!tokens || !tokens.access_token || !tokens.user_details_token) throw new Error("No refresh_token in response");
472
- return {
473
- access_token: tokens.access_token,
474
- user_details_token: tokens.user_details_token
475
- };
476
- } catch (error) {
477
- logger.error("[EnhancedRefresh] Refresh token call failed:", {
478
- error,
479
- name: error?.name,
480
- message: error?.message,
481
- code: error?.code,
482
- originalError: error?.originalError,
483
- stack: error?.stack
484
- });
485
- if (error?.name === "InternalServerError" && error?.originalError) throw error.originalError;
486
- throw error;
487
- }
488
- }
489
- async warmupAndRetryRefresh() {
490
- logger.debug("[EnhancedRefresh] Warming up cookie context");
491
- await this.warmupCookieContext();
492
- await this.delay(150);
493
- return this.directRefreshToken();
494
- }
495
- async alternativeDomainRefresh() {
496
- await this.warmupCookieContext();
497
- await this.delay(300);
498
- return this.directRefreshToken();
499
- }
500
- async warmupCookieContext() {
501
- const warmupStrategies = [
502
- () => fetch(window.location.origin + "/favicon.ico", {
503
- method: "HEAD",
504
- credentials: "include",
505
- cache: "no-cache",
506
- mode: "same-origin"
507
- }),
508
- () => {
509
- const rpcEndpoint = useEnv().restApiClient.apiUrl + "/rpc";
510
- return fetch(rpcEndpoint, {
511
- method: "OPTIONS",
512
- credentials: "include",
513
- cache: "no-cache"
514
- });
515
- },
516
- () => fetch(window.location.origin + "/", {
517
- method: "HEAD",
518
- credentials: "include",
519
- cache: "no-cache",
520
- mode: "same-origin"
521
- })
522
- ];
523
- try {
524
- await Promise.race(warmupStrategies.map((strategy) => strategy().catch(() => {})));
525
- logger.debug("[EnhancedRefresh] Cookie context warmed up");
526
- } catch (error) {
527
- logger.debug("[EnhancedRefresh] Cookie warmup failed, continuing:", error);
528
- }
529
- }
530
- delay(ms) {
531
- return new Promise((resolve) => setTimeout(resolve, ms));
532
- }
533
- shouldAttemptRefresh() {
534
- return Date.now() - this.refreshState.lastAttempt > Math.min(5e3, 1e3 * Math.pow(2, this.refreshState.failureCount));
535
- }
536
- getRefreshState() {
537
- return { ...this.refreshState };
538
- }
539
- };
540
- /**
541
- * Create an instance of the refresh token handler for your API type.
542
- * Your API must extend AuthenticatableApi (must have userSessions.refreshToken method).
543
- *
544
- * @example
545
- * ```typescript
546
- * // In your app's setup/config
547
- * import type { AppApi } from '@follow-zap/shared';
548
- * import { createRefreshTokenHandler, setRefreshTokenHandler } from '@dragonmastery/dragoncore-vue';
549
- *
550
- * // Initialize during app setup
551
- * setRefreshTokenHandler(createRefreshTokenHandler<AppApi>());
552
- * ```
553
- */
554
- function createRefreshTokenHandler() {
555
- return new EnhancedRefreshTokenHandler();
556
- }
557
- /**
558
- * Global refresh token handler instance.
559
- * Set this once in your app's initialization.
560
- */
561
- let globalRefreshTokenHandler = null;
562
- /**
563
- * Set the global refresh token handler for your application.
564
- * Call this once during app initialization.
565
- */
566
- function setRefreshTokenHandler(handler) {
567
- globalRefreshTokenHandler = handler;
568
- }
569
- /**
570
- * Get the global refresh token handler.
571
- * This is used internally by useQuery and useMutation.
572
- *
573
- * @throws Error if handler is not set
574
- */
575
- function getRefreshTokenHandler() {
576
- if (!globalRefreshTokenHandler) throw new Error("Refresh token handler not initialized. Call setRefreshTokenHandler() in your app initialization.");
577
- return globalRefreshTokenHandler;
578
- }
579
-
580
394
  //#endregion
581
395
  //#region src/composables/useRpcAuth.ts
582
396
  /**
@@ -589,7 +403,10 @@ const AUTH_ERROR_CODES = [
589
403
  "NO_REFRESH_TOKEN"
590
404
  ];
591
405
  /** Business error codes for frontend handling (e.g. redirects) */
592
- const BusinessErrorCode = { EMAIL_VERIFICATION_REQUIRED: "EMAIL_VERIFICATION_REQUIRED" };
406
+ const BusinessErrorCode = {
407
+ EMAIL_VERIFICATION_REQUIRED: "EMAIL_VERIFICATION_REQUIRED",
408
+ CONSENT_REQUIRED: "CONSENT_REQUIRED"
409
+ };
593
410
  const BATCH_MODE = {
594
411
  batch: "batch",
595
412
  tracked: "tracked"
@@ -691,8 +508,8 @@ function createAppBatch(options) {
691
508
  const userStore = useUserSessionStore();
692
509
  const env = useEnv();
693
510
  const headers = {};
694
- const accessToken = userStore.accessToken;
695
- if (accessToken) headers["Authorization"] = `Bearer ${accessToken}`;
511
+ const token = options?.authTokenOverride ?? userStore.accessToken;
512
+ if (token) headers["Authorization"] = `Bearer ${token}`;
696
513
  const request = new Request(env.restApiClient.apiUrl + "/rpc", {
697
514
  method: "POST",
698
515
  headers,
@@ -712,7 +529,10 @@ function createAppBatch(options) {
712
529
  */
713
530
  async function executeWithAuth(fn, options) {
714
531
  const userStore = useUserSessionStore();
715
- if (options?.skipAuthCheck) return await fn(createAppBatch(options));
532
+ if (options?.skipAuthCheck) return await fn(createAppBatch({
533
+ ...options,
534
+ authTokenOverride: options.authTokenOverride
535
+ }));
716
536
  if (needsRefresh(userStore)) {
717
537
  if (!await attemptRefresh(userStore, options.refreshTokenHandler)) {
718
538
  if (!userStore.accessToken) {
@@ -731,7 +551,8 @@ async function executeWithAuth(fn, options) {
731
551
  }
732
552
  return await fn(createAppBatch(options));
733
553
  } catch (error) {
734
- if ((error?.code ?? error?.originalError?.code) === BusinessErrorCode.EMAIL_VERIFICATION_REQUIRED) {
554
+ const errorCode = error?.code ?? error?.originalError?.code;
555
+ if (errorCode === BusinessErrorCode.EMAIL_VERIFICATION_REQUIRED) {
735
556
  const router = getRouter();
736
557
  const currentPath = router.currentRoute.value.fullPath;
737
558
  const returnUrl = currentPath.startsWith("/") && !currentPath.startsWith("/auth/") ? currentPath : void 0;
@@ -741,6 +562,16 @@ async function executeWithAuth(fn, options) {
741
562
  });
742
563
  throw error;
743
564
  }
565
+ if (errorCode === BusinessErrorCode.CONSENT_REQUIRED) {
566
+ const router = getRouter();
567
+ const currentPath = router.currentRoute.value.fullPath;
568
+ const returnUrl = currentPath.startsWith("/") && !currentPath.startsWith("/auth/") ? currentPath : void 0;
569
+ await router.push({
570
+ path: "/auth/consent-required",
571
+ query: returnUrl ? { returnUrl } : {}
572
+ });
573
+ throw error;
574
+ }
744
575
  if (isAuthError(error)) {
745
576
  if (await attemptRefresh(userStore, options.refreshTokenHandler)) return await fn(createAppBatch(options));
746
577
  await pushToLogout();
@@ -780,5 +611,5 @@ function createTrackedSession(request, trackedSegment) {
780
611
  }
781
612
 
782
613
  //#endregion
783
- export { EnhancedRefreshTokenHandler as a, setRefreshTokenHandler as c, Logger as d, logIfEnabled as f, setRouter as i, useUserSessionStore as l, useEnv as m, createAppBatch as n, createRefreshTokenHandler as o, logger as p, executeWithAuth as r, getRefreshTokenHandler as s, BATCH_MODE as t, LOG_LEVEL as u };
784
- //# sourceMappingURL=useRpcAuth-rmHf7bYx.js.map
614
+ export { createAppBatch$1 as a, Logger as c, useEnv as d, setRouter as i, logIfEnabled as l, createAppBatch as n, useUserSessionStore as o, executeWithAuth as r, LOG_LEVEL as s, BATCH_MODE as t, logger as u };
615
+ //# sourceMappingURL=useRpcAuth-CJtq1dqM.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useRpcAuth-CJtq1dqM.js","names":["createAppBatch","refreshError: any","createAppBatch","headers: HeadersInit","globalRouter: Router | null","error: any","headers: HeadersInit","method: any"],"sources":["../src/composables/useEnv.ts","../src/utils/logger.ts","../src/composables/useUserSessionStore.ts","../src/composables/useRpc.ts","../src/composables/useRpcAuth.ts"],"sourcesContent":["import { readonly } from 'vue';\n\nexport function useEnv() {\n const env = {\n restApiClient: {\n apiUrl: import.meta.env.VITE_API_CLIENT_URL as string,\n authOptions: {\n userDetails: import.meta.env.VITE_CF_APP_USER_DETAILS as string,\n accessToken: import.meta.env.VITE_CF_APP_ACCESS_TOKEN as string,\n decodedToken: import.meta.env.VITE_CF_APP_DECODED_TOKEN as string,\n },\n },\n allowUserSignup: import.meta.env.VITE_ALLOW_USER_SIGNUP === 'true',\n /** 'disabled' | 'soft' | 'strict' - undefined treated as 'disabled' */\n emailVerificationMode: (import.meta.env.VITE_EMAIL_VERIFICATION_MODE as\n | 'disabled'\n | 'soft'\n | 'strict'\n | undefined) ?? 'disabled',\n maxAttachmentFileSize: import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB\n ? parseInt(import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB, 10) * 1024 * 1024\n : 50 * 1024 * 1024, // Default: 50MB (convert MB to bytes)\n };\n\n return readonly(env);\n}\n","/**\n * Log levels as string literals\n */\nexport const LOG_LEVEL = {\n NONE: 'NONE',\n ERROR: 'ERROR',\n WARN: 'WARN',\n INFO: 'INFO',\n DEBUG: 'DEBUG',\n TRACE: 'TRACE',\n} as const;\n\nexport type LogLevel = (typeof LOG_LEVEL)[keyof typeof LOG_LEVEL];\n\n/**\n * Logger utility that conditionally logs based on configured log level\n */\nexport class Logger {\n private static instance: Logger;\n private logLevel: LogLevel = LOG_LEVEL.INFO; // Default log level\n\n private constructor() {\n this.setLogLevelFromEnv();\n }\n\n /**\n * Get the singleton logger instance\n */\n public static getInstance(): Logger {\n if (!Logger.instance) {\n Logger.instance = new Logger();\n }\n return Logger.instance;\n }\n\n /**\n * Set the log level from environment variables\n */\n private setLogLevelFromEnv(): void {\n // Check for explicit log level setting\n const logLevelStr = (import.meta.env.VITE_LOG_LEVEL as string) || '';\n\n if (logLevelStr) {\n switch (logLevelStr.toUpperCase()) {\n case 'NONE':\n this.logLevel = LOG_LEVEL.NONE;\n break;\n case 'ERROR':\n this.logLevel = LOG_LEVEL.ERROR;\n break;\n case 'WARN':\n this.logLevel = LOG_LEVEL.WARN;\n break;\n case 'INFO':\n this.logLevel = LOG_LEVEL.INFO;\n break;\n case 'DEBUG':\n this.logLevel = LOG_LEVEL.DEBUG;\n break;\n case 'TRACE':\n this.logLevel = LOG_LEVEL.TRACE;\n break;\n }\n } else {\n // If no explicit log level, set based on environment\n const isDev =\n import.meta.env.DEV === true ||\n import.meta.env.MODE === 'development' ||\n import.meta.env.VITE_APP_ENV === 'local' ||\n import.meta.env.VITE_APP_ENV === 'dev';\n\n this.logLevel = isDev ? LOG_LEVEL.DEBUG : LOG_LEVEL.INFO;\n }\n\n console.log(`[Logger] Log level set to: ${this.logLevel.toUpperCase()}`);\n }\n\n /**\n * Set the log level programmatically\n */\n public setLogLevel(level: LogLevel): void {\n this.logLevel = level;\n console.log(`[Logger] Log level changed to: ${this.logLevel.toUpperCase()}`);\n }\n\n /**\n * Get the current log level\n */\n public getLogLevel(): LogLevel {\n return this.logLevel;\n }\n\n /**\n * Determine if a message at the given level should be logged\n * based on the current log level setting\n */\n private shouldLog(level: LogLevel): boolean {\n // Define log level hierarchy (higher number = more verbose)\n const levelPriority = {\n [LOG_LEVEL.NONE]: 0,\n [LOG_LEVEL.ERROR]: 1,\n [LOG_LEVEL.WARN]: 2,\n [LOG_LEVEL.INFO]: 3,\n [LOG_LEVEL.DEBUG]: 4,\n [LOG_LEVEL.TRACE]: 5,\n };\n\n // Compare current log level with requested level\n // Only log if the current level is equal to or higher than the requested level\n return levelPriority[this.logLevel] >= levelPriority[level];\n }\n\n /**\n * Log a trace message (most verbose)\n */\n public trace(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.TRACE)) {\n console.log(`[TRACE] ${message}`, ...args);\n }\n }\n\n /**\n * Log a debug message\n */\n public debug(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.DEBUG)) {\n console.debug(`[DEBUG] ${message}`, ...args);\n }\n }\n\n /**\n * Log an info message\n */\n public info(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.INFO)) {\n console.log(`[INFO] ${message}`, ...args);\n }\n }\n\n /**\n * Log a warning message\n */\n public warn(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.WARN)) {\n console.warn(`[WARN] ${message}`, ...args);\n }\n }\n\n /**\n * Log an error message\n */\n public error(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.ERROR)) {\n console.error(`[ERROR] ${message}`, ...args);\n }\n }\n}\n\n// Export a singleton instance for easy use throughout the app\nexport const logger = Logger.getInstance();\n\n/**\n * Conditionally log based on per-instance debug flag and global log level\n * - If debug === false: never log (explicitly disabled)\n * - If debug === true: always log (bypasses global log level)\n * - If debug === undefined: use global log level (default behavior)\n */\nexport function logIfEnabled(\n level: 'debug' | 'error' | 'warn' | 'info',\n message: string,\n debug: boolean | undefined,\n ...args: any[]\n): void {\n if (debug === false) return; // Explicitly disabled\n if (debug === true) {\n // Explicitly enabled - log directly bypassing global log level\n const prefix = `[${level.toUpperCase()}]`;\n if (level === 'error') console.error(prefix, message, ...args);\n else if (level === 'warn') console.warn(prefix, message, ...args);\n else console.log(prefix, message, ...args);\n return;\n }\n // Otherwise use logger which respects global log level\n if (level === 'debug') logger.debug(message, ...args);\n else if (level === 'error') logger.error(message, ...args);\n else if (level === 'warn') logger.warn(message, ...args);\n else logger.info(message, ...args);\n}\n","import { jwtDecode } from 'jwt-decode';\nimport { defineStore } from 'pinia';\nimport { computed, ref, watchEffect } from 'vue';\nimport type { UserAppSession, UserDetailsTokenPayload } from '../lib/models/userSession';\nimport { logIfEnabled, logger } from '../utils/logger';\nimport { useEnv } from './useEnv';\nimport { createAppBatch } from './useRpc';\n\n/**\n * Generic user session store for Dragoncore applications.\n *\n * Responsibilities:\n * - Store and manage user session state (accessToken, userSession)\n * - Sync with localStorage\n * - Provide token refresh capability\n * - Provide token expiration checking\n *\n * Note: This store is intentionally NOT generic on TApi.\n * The refresh method uses createAppBatch which can be typed on a per-call basis.\n */\nexport const useUserSessionStore = defineStore('userSession', () => {\n const env = useEnv().restApiClient;\n const userSession = ref<UserAppSession | null>(null);\n const accessToken = ref<string | null>(null);\n const decodedToken = ref<any | null>(null);\n const isRefreshing = ref(false);\n const debug = ref<boolean>(false);\n\n // Watch localStorage for external changes and update our reactive refs\n watchEffect(() => {\n // Check if localStorage keys are properly defined\n if (!env.authOptions.accessToken || !env.authOptions.userDetails) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] localStorage keys are undefined - check environment variables',\n debug.value,\n );\n return;\n }\n\n const storedAccessToken = localStorage.getItem(env.authOptions.accessToken);\n if (storedAccessToken !== accessToken.value) {\n accessToken.value = storedAccessToken;\n try {\n decodedToken.value = storedAccessToken ? jwtDecode(storedAccessToken) : null;\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode access token:',\n debug.value,\n error,\n );\n decodedToken.value = null;\n }\n }\n\n const storedUserSession = localStorage.getItem(env.authOptions.userDetails);\n if (storedUserSession) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(storedUserSession);\n // Extract the actual session data from the nested 'details' field\n const sessionData = decoded.details;\n if (JSON.stringify(sessionData) !== JSON.stringify(userSession.value)) {\n userSession.value = sessionData;\n }\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode user session:',\n debug.value,\n error,\n );\n if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n } else if (userSession.value !== null) {\n userSession.value = null;\n }\n });\n\n const currentSession = computed(() => {\n if (!userSession.value) {\n return null;\n }\n return userSession.value;\n });\n\n const clientHeaders = computed(() => ({\n 'Content-Type': 'application/json',\n ...(accessToken.value ? { Authorization: `Bearer ${accessToken.value}` } : {}),\n }));\n\n /**\n * Refresh the access token using the refresh token (from HTTP-only cookie).\n * This method uses createAppBatch directly to avoid circular dependencies.\n *\n * @returns true if refresh was successful, false otherwise\n */\n async function refreshToken<\n TApi extends {\n userSessions: {\n refreshToken(): Promise<{ access_token: string; user_details_token: string }>;\n };\n },\n >(): Promise<boolean> {\n try {\n if (isRefreshing.value) {\n logIfEnabled('debug', '[RefreshToken] Token refresh already in progress', debug.value);\n return false;\n }\n\n isRefreshing.value = true;\n logIfEnabled('debug', '[RefreshToken] Starting token refresh', debug.value);\n\n // Check if refresh token is expired (if we have session data)\n if (userSession.value) {\n const tokenStatus = isTokenExpired();\n if (tokenStatus.refreshTokenExpired) {\n logIfEnabled(\n 'warn',\n '[RefreshToken] Refresh token is already expired, cannot refresh',\n debug.value,\n );\n return false;\n }\n }\n\n // Use createAppBatch directly - refresh endpoint is public and doesn't need auth wrapper\n // credentials: 'include' allows the HTTP-only refresh token cookie to be sent\n const batch = createAppBatch<TApi>({\n credentials: 'include',\n trackedSegment: 'userSessions.refreshToken',\n });\n const tokens = await batch.userSessions.refreshToken();\n\n if (!tokens || !tokens.access_token || !tokens.user_details_token) {\n logIfEnabled(\n 'error',\n '[RefreshToken] Invalid response from refresh endpoint',\n debug.value,\n );\n return false;\n }\n\n // Set both tokens using existing validation logic\n setSession(tokens.user_details_token);\n setAccessToken(tokens.access_token);\n\n // Verify that both components of the session were properly updated\n const sessionUpdated = !!userSession.value && !!accessToken.value;\n if (!sessionUpdated) {\n logIfEnabled(\n 'error',\n '[RefreshToken] Failed to update all session components',\n debug.value,\n );\n return false;\n }\n\n // Verify the new tokens are not expired\n const newTokenStatus = isTokenExpired();\n if (newTokenStatus.accessTokenExpired) {\n logIfEnabled(\n 'error',\n '[RefreshToken] New access token is already expired!',\n debug.value,\n );\n return false;\n }\n\n logIfEnabled('debug', '[RefreshToken] Token refresh successful', debug.value);\n return true;\n } catch (refreshError: any) {\n logIfEnabled('error', '[RefreshToken] Token refresh failed:', debug.value, refreshError);\n return false;\n } finally {\n isRefreshing.value = false;\n }\n }\n\n /**\n * Check if tokens are expired\n */\n function isTokenExpired(): { accessTokenExpired: boolean; refreshTokenExpired: boolean } {\n const now = Date.now() / 1000;\n\n // Access token expiration check\n const accessTokenExpired = decodedToken.value?.exp ? decodedToken.value.exp < now : true;\n\n // Refresh token expiration check\n const refreshTokenExpired = userSession.value?.expires_at\n ? new Date(userSession.value.expires_at).getTime() / 1000 < now\n : true;\n\n return { accessTokenExpired, refreshTokenExpired };\n }\n\n /**\n * Set the user session (stored in localStorage as JWT)\n */\n function setSession(token: string | null) {\n if (token) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(token);\n // Extract the actual session data from the nested 'details' field\n userSession.value = decoded.details;\n localStorage.setItem(env.authOptions.userDetails, token);\n logIfEnabled('debug', '[SetSession] User session set successfully', debug.value);\n } catch (error) {\n logger.error('[SetSession] Failed to decode user session token:', error);\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n }\n } else {\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n logIfEnabled('debug', '[SetSession] User session cleared', debug.value);\n }\n }\n\n /**\n * Set the access token (stored in localStorage as JWT string)\n */\n function setAccessToken(token: string | null) {\n if (token) {\n try {\n const decoded = jwtDecode(token);\n accessToken.value = token;\n decodedToken.value = decoded;\n localStorage.setItem(env.authOptions.accessToken, token);\n logIfEnabled('debug', '[SetAccessToken] Access token set successfully', debug.value);\n } catch (error) {\n logger.error('[SetAccessToken] Failed to decode access token:', error);\n accessToken.value = null;\n decodedToken.value = null;\n localStorage.removeItem(env.authOptions.accessToken);\n // Also clear user session if we're clearing the access token\n if (userSession.value) {\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n }\n }\n } else {\n accessToken.value = null;\n decodedToken.value = null;\n localStorage.removeItem(env.authOptions.accessToken);\n logIfEnabled('debug', '[SetAccessToken] Access token cleared', debug.value);\n }\n }\n\n /**\n * Clear all session data\n */\n function clearSession() {\n setSession(null);\n setAccessToken(null);\n }\n\n /**\n * Re-read session from localStorage and update in-memory state.\n * Use when another tab may have updated localStorage (e.g. after email verification).\n */\n function syncFromStorage() {\n if (!env.authOptions.accessToken || !env.authOptions.userDetails) return;\n\n const storedAccessToken = localStorage.getItem(env.authOptions.accessToken);\n if (storedAccessToken !== accessToken.value) {\n accessToken.value = storedAccessToken;\n try {\n decodedToken.value = storedAccessToken ? jwtDecode(storedAccessToken) : null;\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode access token:',\n debug.value,\n error,\n );\n decodedToken.value = null;\n }\n }\n\n const storedUserSession = localStorage.getItem(env.authOptions.userDetails);\n if (storedUserSession) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(storedUserSession);\n const sessionData = decoded.details;\n if (JSON.stringify(sessionData) !== JSON.stringify(userSession.value)) {\n userSession.value = sessionData;\n }\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode user session:',\n debug.value,\n error,\n );\n if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n } else if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n\n return {\n // State\n userSession,\n currentSession,\n accessToken,\n clientHeaders,\n debug,\n // Methods\n setSession,\n setAccessToken,\n clearSession,\n refreshToken,\n syncFromStorage,\n isTokenExpired,\n };\n});\n","import { newHttpBatchRpcSession, type RpcStub } from 'capnweb';\nimport type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { useEnv } from './useEnv';\nimport { useUserSessionStore } from './useUserSessionStore';\n\n/**\n * Creates a fresh RPC batch session with authentication headers.\n * Each call creates a new session, which is the correct pattern for Cap'n Web RPC.\n *\n * This is the simple version - just creates a batch with auth headers.\n * For advanced features (token refresh, retry, tracked sessions), use executeWithAuth from useRpcAuth.\n *\n * @param options - Optional configuration for the RPC batch\n * @param options.credentials - Credentials mode for the request. Use 'include' for login/logout/refreshToken to allow cookies.\n * @param options.trackedSegment - Path segment to append to /rpc for metrics/tracking (e.g. 'userSessions.refreshToken').\n */\nexport function createAppBatch<TApi extends Record<string, any> = DragoncoreApi>(options?: {\n credentials?: RequestCredentials;\n trackedSegment?: string;\n}): RpcStub<TApi> {\n const userStore = useUserSessionStore();\n const env = useEnv();\n\n const headers: HeadersInit = {};\n // Pinia stores auto-unwrap refs, so accessToken is already string | null\n const accessToken = userStore.accessToken;\n if (accessToken) {\n headers['Authorization'] = `Bearer ${accessToken}`;\n }\n\n const baseUrl = env.restApiClient.apiUrl + '/rpc';\n const url = options?.trackedSegment ? `${baseUrl}/${options.trackedSegment}` : baseUrl;\n\n // Create a Request object with headers (capnweb accepts Request objects)\n const request = new Request(url, {\n method: 'POST', // Will be overridden by capnweb, but required for Request constructor\n headers,\n credentials: options?.credentials ?? 'omit', // Use 'include' for login/logout/refreshToken\n });\n\n return newHttpBatchRpcSession<TApi>(request);\n}\n","import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { newHttpBatchRpcSession, type RpcStub } from 'capnweb';\nimport type { Router } from 'vue-router';\nimport { useEnv } from './useEnv';\nimport { useUserSessionStore } from './useUserSessionStore';\n\n/**\n * Auth error codes that should trigger token refresh\n */\nconst AUTH_ERROR_CODES = [\n 'ACCESS_TOKEN_EXPIRED',\n 'ACCESS_TOKEN_REVOKED',\n 'NO_ACCESS_TOKEN',\n 'NO_REFRESH_TOKEN',\n];\n\n/** Business error codes for frontend handling (e.g. redirects) */\nconst BusinessErrorCode = {\n EMAIL_VERIFICATION_REQUIRED: 'EMAIL_VERIFICATION_REQUIRED',\n CONSENT_REQUIRED: 'CONSENT_REQUIRED',\n} as const;\n\nexport const BATCH_MODE = {\n batch: 'batch',\n tracked: 'tracked',\n} as const;\n\nexport type BatchMode = (typeof BATCH_MODE)[keyof typeof BATCH_MODE];\n\n/**\n * Check if an error is an auth error that should trigger refresh\n */\nfunction isAuthError(error: any): boolean {\n if (!error) return false;\n\n // Unwrap InternalServerError to get original error\n let actualError = error;\n if (error.name === 'InternalServerError' && error.originalError) {\n actualError = error.originalError;\n }\n\n // Check for AuthenticationError class name\n if (actualError.name === 'AuthenticationError' || error.name === 'AuthenticationError') {\n return true;\n }\n\n // Check for error code property\n if (actualError.code && AUTH_ERROR_CODES.includes(actualError.code)) return true;\n if (error.code && AUTH_ERROR_CODES.includes(error.code)) return true;\n\n // Check error message for auth error patterns\n const errorMessage = actualError.message || error.message || String(error);\n if (AUTH_ERROR_CODES.some((code) => errorMessage.includes(code))) return true;\n\n // Check for common auth error strings\n if (\n errorMessage.includes('Unauthorized') ||\n errorMessage.includes('authentication') ||\n errorMessage.includes('token')\n ) {\n // Only treat as auth error if it's clearly an auth issue\n return (\n errorMessage.toLowerCase().includes('expired') ||\n errorMessage.toLowerCase().includes('revoked') ||\n errorMessage.toLowerCase().includes('invalid token') ||\n errorMessage.toLowerCase().includes('no refresh token')\n );\n }\n\n return false;\n}\n\n/**\n * Global router instance.\n * Set this once in your app's initialization.\n */\nlet globalRouter: Router | null = null;\n\n/**\n * Set the global router instance for your application.\n * Call this once during app initialization.\n */\nexport function setRouter(router: Router): void {\n globalRouter = router;\n}\n\n/**\n * Get the global router instance.\n * This is used internally by executeWithAuth for navigation.\n *\n * @throws Error if router is not set\n */\nfunction getRouter(): Router {\n if (!globalRouter) {\n throw new Error('Router not initialized. Call setRouter() in your app initialization.');\n }\n return globalRouter;\n}\n\n/**\n * Push to logout with returnUrl so user can return to their intended destination after re-login.\n * Validates path: must start with / and not /auth/ to avoid loops.\n */\nfunction pushToLogout() {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n const query = returnUrl ? { returnUrl } : {};\n return router.push({ path: '/auth/logout', query });\n}\n\n/**\n * Check if token needs refresh before making a request\n */\nfunction needsRefresh(userStore: ReturnType<typeof useUserSessionStore>): boolean {\n if (!userStore.accessToken) {\n return true;\n }\n const { accessTokenExpired, refreshTokenExpired } = userStore.isTokenExpired();\n return accessTokenExpired || refreshTokenExpired;\n}\n\n/**\n * Attempt to refresh the token using the provided handler\n */\nasync function attemptRefresh(\n userStore: ReturnType<typeof useUserSessionStore>,\n refreshTokenHandler: {\n shouldAttemptRefresh(): boolean;\n performRefreshWithStrategies(): Promise<{\n access_token: string;\n user_details_token: string;\n }>;\n },\n): Promise<boolean> {\n try {\n if (!userStore.currentSession && !userStore.accessToken) {\n return false;\n }\n\n if (userStore.currentSession) {\n const { refreshTokenExpired } = userStore.isTokenExpired();\n if (refreshTokenExpired) {\n await pushToLogout();\n return false;\n }\n }\n\n if (!refreshTokenHandler.shouldAttemptRefresh()) {\n return false;\n }\n\n const tokens = await refreshTokenHandler.performRefreshWithStrategies();\n userStore.setSession(tokens.user_details_token);\n userStore.setAccessToken(tokens.access_token);\n return true;\n } catch (error: any) {\n console.error('[RPC Auth] Refresh attempt failed:', {\n error,\n name: error?.name,\n message: error?.message,\n code: error?.code,\n originalError: error?.originalError,\n });\n\n // Unwrap InternalServerError to check original error\n const actualError = error?.originalError || error;\n const errorMessage = (actualError?.message || error?.message || '').toUpperCase();\n const originalErrorMessage = (error?.originalError?.message || '').toUpperCase();\n const combinedMessage = `${errorMessage} ${originalErrorMessage}`;\n\n const criticalError =\n combinedMessage.includes('NO_REFRESH_TOKEN') ||\n combinedMessage.includes('REFRESH_TOKEN_EXPIRED') ||\n combinedMessage.includes('REFRESH_TOKEN_REVOKED') ||\n combinedMessage.includes('INVALID REFRESH TOKEN') ||\n combinedMessage.includes('NO REFRESH TOKEN FOUND');\n\n if (criticalError) {\n await pushToLogout();\n }\n return false;\n }\n}\n\n/**\n * Create a base RPC batch with current auth token\n */\nexport function createAppBatch<TApi extends Record<string, any> = DragoncoreApi>(options?: {\n credentials?: RequestCredentials;\n mode?: BatchMode;\n trackedSegment?: string;\n /** Override auth token (e.g. signup_consent token). When set, used instead of access token. */\n authTokenOverride?: string;\n}): RpcStub<TApi> {\n const userStore = useUserSessionStore();\n const env = useEnv();\n\n const headers: HeadersInit = {};\n const token = options?.authTokenOverride ?? userStore.accessToken;\n if (token) {\n headers['Authorization'] = `Bearer ${token}`;\n }\n\n const request = new Request(env.restApiClient.apiUrl + '/rpc', {\n method: 'POST',\n headers,\n credentials: options?.credentials ?? 'omit',\n });\n\n // If mode is batch and no tracked segment is provided then we can just return the batch\n if (options?.mode === BATCH_MODE.batch && !options?.trackedSegment) {\n return newHttpBatchRpcSession<TApi>(request);\n }\n\n // Use tracked session for metrics (creates separate HTTP request per method)\n return createTrackedSession<TApi>(request, options?.trackedSegment);\n}\n\n/**\n * Execute an RPC call with automatic auth handling\n * - Checks token expiration before call\n * - Handles auth errors and retries after refresh\n *\n * @param fn - Function that receives an RPC batch and returns a promise\n * @param options - Configuration options\n * @param options.refreshTokenHandler - Instance of refresh token handler for your API type\n */\nexport async function executeWithAuth<\n TApi extends Record<string, any> = DragoncoreApi,\n T = any,\n>(\n fn: (batch: RpcStub<TApi>) => Promise<T>,\n options: {\n credentials?: RequestCredentials;\n skipAuthCheck?: boolean;\n mode?: BatchMode;\n trackedSegment?: string;\n /** Override auth token for this request (e.g. signup_consent token) */\n authTokenOverride?: string;\n refreshTokenHandler: {\n shouldAttemptRefresh(): boolean;\n performRefreshWithStrategies(): Promise<{\n access_token: string;\n user_details_token: string;\n }>;\n };\n },\n): Promise<T> {\n const userStore = useUserSessionStore();\n\n // Skip auth for login/logout/refreshToken/signupComplete (with custom token) operations\n if (options?.skipAuthCheck) {\n const batch = createAppBatch<TApi>({\n ...options,\n authTokenOverride: options.authTokenOverride,\n });\n return await fn(batch);\n }\n\n // Check if token needs refresh before making the request\n if (needsRefresh(userStore)) {\n const refreshed = await attemptRefresh(userStore, options.refreshTokenHandler);\n if (!refreshed) {\n // If refresh failed and we have no token, don't proceed\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Authentication required');\n }\n // If we have a token but refresh failed, continue anyway (might be temporary)\n } else {\n // Verify the token is actually set\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Token refresh failed to set access token');\n }\n }\n }\n\n // Execute the operation\n try {\n // Double-check we have a token before creating the batch\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Authentication required');\n }\n const batch = createAppBatch<TApi>(options);\n return await fn(batch);\n } catch (error: any) {\n // If BusinessError with EMAIL_VERIFICATION_REQUIRED, redirect to verify-email\n const errorCode = error?.code ?? error?.originalError?.code;\n if (errorCode === BusinessErrorCode.EMAIL_VERIFICATION_REQUIRED) {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n await router.push({\n path: '/auth/verify-email',\n query: returnUrl ? { returnUrl } : {},\n });\n throw error;\n }\n\n // If BusinessError with CONSENT_REQUIRED, redirect to consent-required\n if (errorCode === BusinessErrorCode.CONSENT_REQUIRED) {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n await router.push({\n path: '/auth/consent-required',\n query: returnUrl ? { returnUrl } : {},\n });\n throw error;\n }\n\n // If auth error, refresh and retry once\n if (isAuthError(error)) {\n const refreshed = await attemptRefresh(userStore, options.refreshTokenHandler);\n if (refreshed) {\n const retryBatch = createAppBatch<TApi>(options);\n return await fn(retryBatch);\n }\n await pushToLogout();\n throw error;\n }\n throw error;\n }\n}\n\n/**\n * Create a tracked RPC session that appends method names to URL\n */\nfunction createTrackedSession<T extends Record<string, any> = DragoncoreApi>(\n request: Request,\n trackedSegment?: string,\n): RpcStub<T> {\n const baseUrl = request.url;\n // If trackedSegment is provided then we dont need to do any ofteh complex proxy stuff, append the segment to the url and return the batch\n if (trackedSegment) {\n return newHttpBatchRpcSession<T>(\n new Request(`${baseUrl}/${trackedSegment}`, {\n method: request.method,\n headers: request.headers,\n credentials: request.credentials,\n }),\n );\n }\n\n function createProxy(path: string[] = []): any {\n return new Proxy(() => {}, {\n get(_target, prop) {\n if (typeof prop === 'string') {\n return createProxy([...path, prop]);\n }\n return undefined;\n },\n\n apply(_target, _thisArg, args) {\n // Build the full method path (e.g., \"teams.getUserTeams\")\n const fullPath = path.join('.');\n\n // Clone the request with updated URL\n const trackedRequest = new Request(`${baseUrl}/${fullPath}`, {\n method: request.method,\n headers: request.headers,\n credentials: request.credentials,\n });\n\n // Create batch with the tracked URL\n const batch = newHttpBatchRpcSession<T>(trackedRequest);\n\n // Navigate to the right method on the batch\n let method: any = batch;\n for (const segment of path) {\n method = method[segment];\n }\n\n // Call with original arguments\n return method(...args);\n },\n });\n }\n\n return createProxy() as RpcStub<T>;\n}\n"],"mappings":";;;;;;AAEA,SAAgB,SAAS;AAsBvB,QAAO,SArBK;EACV,eAAe;GACb,QAAQ,OAAO,KAAK,IAAI;GACxB,aAAa;IACX,aAAa,OAAO,KAAK,IAAI;IAC7B,aAAa,OAAO,KAAK,IAAI;IAC7B,cAAc,OAAO,KAAK,IAAI;IAC/B;GACF;EACD,iBAAiB,OAAO,KAAK,IAAI,2BAA2B;EAE5D,uBAAwB,OAAO,KAAK,IAAI,gCAItB;EAClB,uBAAuB,OAAO,KAAK,IAAI,mCACnC,SAAS,OAAO,KAAK,IAAI,kCAAkC,GAAG,GAAG,OAAO,OACxE,KAAK,OAAO;EACjB,CAEmB;;;;;;;;ACrBtB,MAAa,YAAY;CACvB,MAAM;CACN,OAAO;CACP,MAAM;CACN,MAAM;CACN,OAAO;CACP,OAAO;CACR;;;;AAOD,IAAa,SAAb,MAAa,OAAO;CAClB,OAAe;CACf,AAAQ,WAAqB,UAAU;CAEvC,AAAQ,cAAc;AACpB,OAAK,oBAAoB;;;;;CAM3B,OAAc,cAAsB;AAClC,MAAI,CAAC,OAAO,SACV,QAAO,WAAW,IAAI,QAAQ;AAEhC,SAAO,OAAO;;;;;CAMhB,AAAQ,qBAA2B;EAEjC,MAAM,cAAe,OAAO,KAAK,IAAI,kBAA6B;AAElE,MAAI,YACF,SAAQ,YAAY,aAAa,EAAjC;GACE,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;;MAUJ,MAAK,WALH,OAAO,KAAK,IAAI,QAAQ,QACxB,OAAO,KAAK,IAAI,SAAS,iBACzB,OAAO,KAAK,IAAI,iBAAiB,WACjC,OAAO,KAAK,IAAI,iBAAiB,QAEX,UAAU,QAAQ,UAAU;AAGtD,UAAQ,IAAI,8BAA8B,KAAK,SAAS,aAAa,GAAG;;;;;CAM1E,AAAO,YAAY,OAAuB;AACxC,OAAK,WAAW;AAChB,UAAQ,IAAI,kCAAkC,KAAK,SAAS,aAAa,GAAG;;;;;CAM9E,AAAO,cAAwB;AAC7B,SAAO,KAAK;;;;;;CAOd,AAAQ,UAAU,OAA0B;EAE1C,MAAM,gBAAgB;IACnB,UAAU,OAAO;IACjB,UAAU,QAAQ;IAClB,UAAU,OAAO;IACjB,UAAU,OAAO;IACjB,UAAU,QAAQ;IAClB,UAAU,QAAQ;GACpB;AAID,SAAO,cAAc,KAAK,aAAa,cAAc;;;;;CAMvD,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,IAAI,WAAW,WAAW,GAAG,KAAK;;;;;CAO9C,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,MAAM,WAAW,WAAW,GAAG,KAAK;;;;;CAOhD,AAAO,KAAK,SAAiB,GAAG,MAAmB;AACjD,MAAI,KAAK,UAAU,UAAU,KAAK,CAChC,SAAQ,IAAI,UAAU,WAAW,GAAG,KAAK;;;;;CAO7C,AAAO,KAAK,SAAiB,GAAG,MAAmB;AACjD,MAAI,KAAK,UAAU,UAAU,KAAK,CAChC,SAAQ,KAAK,UAAU,WAAW,GAAG,KAAK;;;;;CAO9C,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,MAAM,WAAW,WAAW,GAAG,KAAK;;;AAMlD,MAAa,SAAS,OAAO,aAAa;;;;;;;AAQ1C,SAAgB,aACd,OACA,SACA,OACA,GAAG,MACG;AACN,KAAI,UAAU,MAAO;AACrB,KAAI,UAAU,MAAM;EAElB,MAAM,SAAS,IAAI,MAAM,aAAa,CAAC;AACvC,MAAI,UAAU,QAAS,SAAQ,MAAM,QAAQ,SAAS,GAAG,KAAK;WACrD,UAAU,OAAQ,SAAQ,KAAK,QAAQ,SAAS,GAAG,KAAK;MAC5D,SAAQ,IAAI,QAAQ,SAAS,GAAG,KAAK;AAC1C;;AAGF,KAAI,UAAU,QAAS,QAAO,MAAM,SAAS,GAAG,KAAK;UAC5C,UAAU,QAAS,QAAO,MAAM,SAAS,GAAG,KAAK;UACjD,UAAU,OAAQ,QAAO,KAAK,SAAS,GAAG,KAAK;KACnD,QAAO,KAAK,SAAS,GAAG,KAAK;;;;;;;;;;;;;;;;;ACtKpC,MAAa,sBAAsB,YAAY,qBAAqB;CAClE,MAAM,MAAM,QAAQ,CAAC;CACrB,MAAM,cAAc,IAA2B,KAAK;CACpD,MAAM,cAAc,IAAmB,KAAK;CAC5C,MAAM,eAAe,IAAgB,KAAK;CAC1C,MAAM,eAAe,IAAI,MAAM;CAC/B,MAAM,QAAQ,IAAa,MAAM;AAGjC,mBAAkB;AAEhB,MAAI,CAAC,IAAI,YAAY,eAAe,CAAC,IAAI,YAAY,aAAa;AAChE,gBACE,SACA,oFACA,MAAM,MACP;AACD;;EAGF,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,sBAAsB,YAAY,OAAO;AAC3C,eAAY,QAAQ;AACpB,OAAI;AACF,iBAAa,QAAQ,oBAAoB,UAAU,kBAAkB,GAAG;YACjE,OAAO;AACd,iBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,iBAAa,QAAQ;;;EAIzB,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,kBACF,KAAI;GAGF,MAAM,cAFU,UAAmC,kBAAkB,CAEzC;AAC5B,OAAI,KAAK,UAAU,YAAY,KAAK,KAAK,UAAU,YAAY,MAAM,CACnE,aAAY,QAAQ;WAEf,OAAO;AACd,gBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,OAAI,YAAY,UAAU,KACxB,aAAY,QAAQ;;WAGf,YAAY,UAAU,KAC/B,aAAY,QAAQ;GAEtB;CAEF,MAAM,iBAAiB,eAAe;AACpC,MAAI,CAAC,YAAY,MACf,QAAO;AAET,SAAO,YAAY;GACnB;CAEF,MAAM,gBAAgB,gBAAgB;EACpC,gBAAgB;EAChB,GAAI,YAAY,QAAQ,EAAE,eAAe,UAAU,YAAY,SAAS,GAAG,EAAE;EAC9E,EAAE;;;;;;;CAQH,eAAe,eAMO;AACpB,MAAI;AACF,OAAI,aAAa,OAAO;AACtB,iBAAa,SAAS,oDAAoD,MAAM,MAAM;AACtF,WAAO;;AAGT,gBAAa,QAAQ;AACrB,gBAAa,SAAS,yCAAyC,MAAM,MAAM;AAG3E,OAAI,YAAY,OAEd;QADoB,gBAAgB,CACpB,qBAAqB;AACnC,kBACE,QACA,mEACA,MAAM,MACP;AACD,YAAO;;;GAUX,MAAM,SAAS,MAJDA,iBAAqB;IACjC,aAAa;IACb,gBAAgB;IACjB,CAAC,CACyB,aAAa,cAAc;AAEtD,OAAI,CAAC,UAAU,CAAC,OAAO,gBAAgB,CAAC,OAAO,oBAAoB;AACjE,iBACE,SACA,yDACA,MAAM,MACP;AACD,WAAO;;AAIT,cAAW,OAAO,mBAAmB;AACrC,kBAAe,OAAO,aAAa;AAInC,OAAI,EADmB,CAAC,CAAC,YAAY,SAAS,CAAC,CAAC,YAAY,QACvC;AACnB,iBACE,SACA,0DACA,MAAM,MACP;AACD,WAAO;;AAKT,OADuB,gBAAgB,CACpB,oBAAoB;AACrC,iBACE,SACA,uDACA,MAAM,MACP;AACD,WAAO;;AAGT,gBAAa,SAAS,2CAA2C,MAAM,MAAM;AAC7E,UAAO;WACAC,cAAmB;AAC1B,gBAAa,SAAS,wCAAwC,MAAM,OAAO,aAAa;AACxF,UAAO;YACC;AACR,gBAAa,QAAQ;;;;;;CAOzB,SAAS,iBAAgF;EACvF,MAAM,MAAM,KAAK,KAAK,GAAG;AAUzB,SAAO;GAAE,oBAPkB,aAAa,OAAO,MAAM,aAAa,MAAM,MAAM,MAAM;GAOvD,qBAJD,YAAY,OAAO,aAC3C,IAAI,KAAK,YAAY,MAAM,WAAW,CAAC,SAAS,GAAG,MAAO,MAC1D;GAE8C;;;;;CAMpD,SAAS,WAAW,OAAsB;AACxC,MAAI,MACF,KAAI;AAGF,eAAY,QAFI,UAAmC,MAAM,CAE7B;AAC5B,gBAAa,QAAQ,IAAI,YAAY,aAAa,MAAM;AACxD,gBAAa,SAAS,8CAA8C,MAAM,MAAM;WACzE,OAAO;AACd,UAAO,MAAM,qDAAqD,MAAM;AACxE,eAAY,QAAQ;AACpB,gBAAa,WAAW,IAAI,YAAY,YAAY;;OAEjD;AACL,eAAY,QAAQ;AACpB,gBAAa,WAAW,IAAI,YAAY,YAAY;AACpD,gBAAa,SAAS,qCAAqC,MAAM,MAAM;;;;;;CAO3E,SAAS,eAAe,OAAsB;AAC5C,MAAI,MACF,KAAI;GACF,MAAM,UAAU,UAAU,MAAM;AAChC,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,QAAQ,IAAI,YAAY,aAAa,MAAM;AACxD,gBAAa,SAAS,kDAAkD,MAAM,MAAM;WAC7E,OAAO;AACd,UAAO,MAAM,mDAAmD,MAAM;AACtE,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,WAAW,IAAI,YAAY,YAAY;AAEpD,OAAI,YAAY,OAAO;AACrB,gBAAY,QAAQ;AACpB,iBAAa,WAAW,IAAI,YAAY,YAAY;;;OAGnD;AACL,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,WAAW,IAAI,YAAY,YAAY;AACpD,gBAAa,SAAS,yCAAyC,MAAM,MAAM;;;;;;CAO/E,SAAS,eAAe;AACtB,aAAW,KAAK;AAChB,iBAAe,KAAK;;;;;;CAOtB,SAAS,kBAAkB;AACzB,MAAI,CAAC,IAAI,YAAY,eAAe,CAAC,IAAI,YAAY,YAAa;EAElE,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,sBAAsB,YAAY,OAAO;AAC3C,eAAY,QAAQ;AACpB,OAAI;AACF,iBAAa,QAAQ,oBAAoB,UAAU,kBAAkB,GAAG;YACjE,OAAO;AACd,iBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,iBAAa,QAAQ;;;EAIzB,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,kBACF,KAAI;GAEF,MAAM,cADU,UAAmC,kBAAkB,CACzC;AAC5B,OAAI,KAAK,UAAU,YAAY,KAAK,KAAK,UAAU,YAAY,MAAM,CACnE,aAAY,QAAQ;WAEf,OAAO;AACd,gBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,OAAI,YAAY,UAAU,KACxB,aAAY,QAAQ;;WAGf,YAAY,UAAU,KAC/B,aAAY,QAAQ;;AAIxB,QAAO;EAEL;EACA;EACA;EACA;EACA;EAEA;EACA;EACA;EACA;EACA;EACA;EACD;EACD;;;;;;;;;;;;;;;ACjTF,SAAgBC,iBAAiE,SAG/D;CAChB,MAAM,YAAY,qBAAqB;CACvC,MAAM,MAAM,QAAQ;CAEpB,MAAMC,UAAuB,EAAE;CAE/B,MAAM,cAAc,UAAU;AAC9B,KAAI,YACF,SAAQ,mBAAmB,UAAU;CAGvC,MAAM,UAAU,IAAI,cAAc,SAAS;CAC3C,MAAM,MAAM,SAAS,iBAAiB,GAAG,QAAQ,GAAG,QAAQ,mBAAmB;AAS/E,QAAO,uBANS,IAAI,QAAQ,KAAK;EAC/B,QAAQ;EACR;EACA,aAAa,SAAS,eAAe;EACtC,CAAC,CAE0C;;;;;;;;AC/B9C,MAAM,mBAAmB;CACvB;CACA;CACA;CACA;CACD;;AAGD,MAAM,oBAAoB;CACxB,6BAA6B;CAC7B,kBAAkB;CACnB;AAED,MAAa,aAAa;CACxB,OAAO;CACP,SAAS;CACV;;;;AAOD,SAAS,YAAY,OAAqB;AACxC,KAAI,CAAC,MAAO,QAAO;CAGnB,IAAI,cAAc;AAClB,KAAI,MAAM,SAAS,yBAAyB,MAAM,cAChD,eAAc,MAAM;AAItB,KAAI,YAAY,SAAS,yBAAyB,MAAM,SAAS,sBAC/D,QAAO;AAIT,KAAI,YAAY,QAAQ,iBAAiB,SAAS,YAAY,KAAK,CAAE,QAAO;AAC5E,KAAI,MAAM,QAAQ,iBAAiB,SAAS,MAAM,KAAK,CAAE,QAAO;CAGhE,MAAM,eAAe,YAAY,WAAW,MAAM,WAAW,OAAO,MAAM;AAC1E,KAAI,iBAAiB,MAAM,SAAS,aAAa,SAAS,KAAK,CAAC,CAAE,QAAO;AAGzE,KACE,aAAa,SAAS,eAAe,IACrC,aAAa,SAAS,iBAAiB,IACvC,aAAa,SAAS,QAAQ,CAG9B,QACE,aAAa,aAAa,CAAC,SAAS,UAAU,IAC9C,aAAa,aAAa,CAAC,SAAS,UAAU,IAC9C,aAAa,aAAa,CAAC,SAAS,gBAAgB,IACpD,aAAa,aAAa,CAAC,SAAS,mBAAmB;AAI3D,QAAO;;;;;;AAOT,IAAIC,eAA8B;;;;;AAMlC,SAAgB,UAAU,QAAsB;AAC9C,gBAAe;;;;;;;;AASjB,SAAS,YAAoB;AAC3B,KAAI,CAAC,aACH,OAAM,IAAI,MAAM,uEAAuE;AAEzF,QAAO;;;;;;AAOT,SAAS,eAAe;CACtB,MAAM,SAAS,WAAW;CAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;CAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;CACnF,MAAM,QAAQ,YAAY,EAAE,WAAW,GAAG,EAAE;AAC5C,QAAO,OAAO,KAAK;EAAE,MAAM;EAAgB;EAAO,CAAC;;;;;AAMrD,SAAS,aAAa,WAA4D;AAChF,KAAI,CAAC,UAAU,YACb,QAAO;CAET,MAAM,EAAE,oBAAoB,wBAAwB,UAAU,gBAAgB;AAC9E,QAAO,sBAAsB;;;;;AAM/B,eAAe,eACb,WACA,qBAOkB;AAClB,KAAI;AACF,MAAI,CAAC,UAAU,kBAAkB,CAAC,UAAU,YAC1C,QAAO;AAGT,MAAI,UAAU,gBAAgB;GAC5B,MAAM,EAAE,wBAAwB,UAAU,gBAAgB;AAC1D,OAAI,qBAAqB;AACvB,UAAM,cAAc;AACpB,WAAO;;;AAIX,MAAI,CAAC,oBAAoB,sBAAsB,CAC7C,QAAO;EAGT,MAAM,SAAS,MAAM,oBAAoB,8BAA8B;AACvE,YAAU,WAAW,OAAO,mBAAmB;AAC/C,YAAU,eAAe,OAAO,aAAa;AAC7C,SAAO;UACAC,OAAY;AACnB,UAAQ,MAAM,sCAAsC;GAClD;GACA,MAAM,OAAO;GACb,SAAS,OAAO;GAChB,MAAM,OAAO;GACb,eAAe,OAAO;GACvB,CAAC;EAMF,MAAM,kBAAkB,KAHJ,OAAO,iBAAiB,QACT,WAAW,OAAO,WAAW,IAAI,aAAa,CAEzC,IADV,OAAO,eAAe,WAAW,IAAI,aAAa;AAUhF,MANE,gBAAgB,SAAS,mBAAmB,IAC5C,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,yBAAyB,CAGlD,OAAM,cAAc;AAEtB,SAAO;;;;;;AAOX,SAAgB,eAAiE,SAM/D;CAChB,MAAM,YAAY,qBAAqB;CACvC,MAAM,MAAM,QAAQ;CAEpB,MAAMC,UAAuB,EAAE;CAC/B,MAAM,QAAQ,SAAS,qBAAqB,UAAU;AACtD,KAAI,MACF,SAAQ,mBAAmB,UAAU;CAGvC,MAAM,UAAU,IAAI,QAAQ,IAAI,cAAc,SAAS,QAAQ;EAC7D,QAAQ;EACR;EACA,aAAa,SAAS,eAAe;EACtC,CAAC;AAGF,KAAI,SAAS,SAAS,WAAW,SAAS,CAAC,SAAS,eAClD,QAAO,uBAA6B,QAAQ;AAI9C,QAAO,qBAA2B,SAAS,SAAS,eAAe;;;;;;;;;;;AAYrE,eAAsB,gBAIpB,IACA,SAeY;CACZ,MAAM,YAAY,qBAAqB;AAGvC,KAAI,SAAS,cAKX,QAAO,MAAM,GAJC,eAAqB;EACjC,GAAG;EACH,mBAAmB,QAAQ;EAC5B,CAAC,CACoB;AAIxB,KAAI,aAAa,UAAU,EAEzB;MAAI,CADc,MAAM,eAAe,WAAW,QAAQ,oBAAoB,EAG5E;OAAI,CAAC,UAAU,aAAa;AAC1B,UAAM,cAAc;AACpB,UAAM,IAAI,MAAM,0BAA0B;;aAKxC,CAAC,UAAU,aAAa;AAC1B,SAAM,cAAc;AACpB,SAAM,IAAI,MAAM,2CAA2C;;;AAMjE,KAAI;AAEF,MAAI,CAAC,UAAU,aAAa;AAC1B,SAAM,cAAc;AACpB,SAAM,IAAI,MAAM,0BAA0B;;AAG5C,SAAO,MAAM,GADC,eAAqB,QAAQ,CACrB;UACfD,OAAY;EAEnB,MAAM,YAAY,OAAO,QAAQ,OAAO,eAAe;AACvD,MAAI,cAAc,kBAAkB,6BAA6B;GAC/D,MAAM,SAAS,WAAW;GAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;GAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;AACnF,SAAM,OAAO,KAAK;IAChB,MAAM;IACN,OAAO,YAAY,EAAE,WAAW,GAAG,EAAE;IACtC,CAAC;AACF,SAAM;;AAIR,MAAI,cAAc,kBAAkB,kBAAkB;GACpD,MAAM,SAAS,WAAW;GAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;GAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;AACnF,SAAM,OAAO,KAAK;IAChB,MAAM;IACN,OAAO,YAAY,EAAE,WAAW,GAAG,EAAE;IACtC,CAAC;AACF,SAAM;;AAIR,MAAI,YAAY,MAAM,EAAE;AAEtB,OADkB,MAAM,eAAe,WAAW,QAAQ,oBAAoB,CAG5E,QAAO,MAAM,GADM,eAAqB,QAAQ,CACrB;AAE7B,SAAM,cAAc;AACpB,SAAM;;AAER,QAAM;;;;;;AAOV,SAAS,qBACP,SACA,gBACY;CACZ,MAAM,UAAU,QAAQ;AAExB,KAAI,eACF,QAAO,uBACL,IAAI,QAAQ,GAAG,QAAQ,GAAG,kBAAkB;EAC1C,QAAQ,QAAQ;EAChB,SAAS,QAAQ;EACjB,aAAa,QAAQ;EACtB,CAAC,CACH;CAGH,SAAS,YAAY,OAAiB,EAAE,EAAO;AAC7C,SAAO,IAAI,YAAY,IAAI;GACzB,IAAI,SAAS,MAAM;AACjB,QAAI,OAAO,SAAS,SAClB,QAAO,YAAY,CAAC,GAAG,MAAM,KAAK,CAAC;;GAKvC,MAAM,SAAS,UAAU,MAAM;IAE7B,MAAM,WAAW,KAAK,KAAK,IAAI;IAa/B,IAAIE,SAHU,uBAPS,IAAI,QAAQ,GAAG,QAAQ,GAAG,YAAY;KAC3D,QAAQ,QAAQ;KAChB,SAAS,QAAQ;KACjB,aAAa,QAAQ;KACtB,CAAC,CAGqD;AAIvD,SAAK,MAAM,WAAW,KACpB,UAAS,OAAO;AAIlB,WAAO,OAAO,GAAG,KAAK;;GAEzB,CAAC;;AAGJ,QAAO,aAAa"}